Src |
Date (GMT) |
Titre |
Description |
Tags |
Stories |
Notes |
|
2021-12-16 10:00:19 |
PseudoManuscrypt: a mass-scale spyware attack campaign (lien direct) |
Kaspersky ICS CERT experts identified malware whose loader has some similarities to the Manuscrypt malware, which is part of the Lazarus APT group's arsenal. |
Malware
|
APT 38
APT 28
|
|
|
2021-02-25 10:00:53 |
Lazarus targets defense industry with ThreatNeedle (lien direct) |
In mid-2020, we realized that Lazarus was launching attacks on the defense industry using the ThreatNeedle cluster, an advanced malware cluster of Manuscrypt (a.k.a. NukeSped). While investigating this activity, we were able to observe the complete life cycle of an attack, uncovering more technical details and links to the group's other campaigns. |
Malware
|
APT 38
APT 28
|
|
|
2020-12-23 10:00:08 |
Lazarus covets COVID-19-related intelligence (lien direct) |
As the COVID-19 crisis grinds on, some threat actors are trying to speed up vaccine development by any means available. We have found evidence that actors, such as the Lazarus group, are going after intelligence that could help these efforts by attacking entities related to COVID-19 research. |
Threat
Medical
|
APT 38
APT 28
|
|