Src |
Date (GMT) |
Titre |
Description |
Tags |
Stories |
Notes |
![SecurityAffairs.webp](./Ressources/img/SecurityAffairs.webp) |
2019-07-22 08:04:00 |
New APT34 campaign uses LinkedIn to deliver fresh malware (lien direct) |
The APT24 group continues its cyber espionage activity, its members were posing as a researcher from Cambridge to infect victims with three new malware. Experts at FireEye have uncovered a new espionage campaign carried out by APT34 APT group (OilRig, and HelixKitten. Greenbug) through LinkedIn. Members of the cyberespionage group were posing as a researcher from Cambridge […]
|
Malware
|
APT 24
APT 34
|
|
![SecurityAffairs.webp](./Ressources/img/SecurityAffairs.webp) |
2019-04-18 20:47:05 |
Analyzing OilRig\'s malware that uses DNS Tunneling (lien direct) |
Iran-linked APT group OilRig is heavily leveraging on DNS tunneling for its cyber espionage campaigns, Palo Alto Networks reveals. Security researchers at Palo Alto Networks reported that Iran-linked APT group OilRig is heavily leveraging on DNS tunneling for its cyber espionage campaigns, Palo Alto Networks reveals. OilRig is an Iran-linked APT group that has been […]
|
Malware
|
APT 34
|
|