What's new arround internet

Last one

Src Date (GMT) Titre Description Tags Stories Notes
DarkReading.webp 2023-12-11 16:15:00 Le groupe Lazarus est toujours à la main Log4Shell, en utilisant des rats écrits en \\ 'd \\'
Lazarus Group Is Still Juicing Log4Shell, Using RATs Written in \\'D\\'
(lien direct)
La tristement célèbre vulnérabilité peut être de l'ancien côté à ce stade, mais Primo apt Lazarus de la Corée du Nord crée de nouveaux logiciels malveillants uniques autour de lui à un clip remarquable.
The infamous vulnerability may be on the older side at this point, but North Korea\'s primo APT Lazarus is creating new, unique malware around it at a remarkable clip.
Malware Vulnerability APT 38 ★★
DarkReading.webp 2023-11-28 17:30:00 Macos malware mix & match: les apts nord-coréens suscitent des attaques fraîches
macOS Malware Mix & Match: North Korean APTs Stir Up Fresh Attacks
(lien direct)
Lazare et ses cohortes changent de chargement et d'autres code entre Rustbucket et Kandykorn MacOS malware pour tromper les victimes et les chercheurs.
Lazarus and its cohorts are switching loaders and other code between RustBucket and KandyKorn macOS malware to fool victims and researchers.
Malware APT 38 APT 38 ★★
DarkReading.webp 2023-11-03 18:55:00 \\ 'kandykorn \\' macos malware attire les ingénieurs cryptographiques
\\'KandyKorn\\' macOS Malware Lures Crypto Engineers
(lien direct)
Se faisant passer pour ses collègues ingénieurs, le groupe de cybercrimes parrainé par l'État nord-coréen Lazare a trompé les développeurs de crypto-échanges pour télécharger le malware difficile à détecter.
Posing as fellow engineers, the North Korean state-sponsored cybercrime group Lazarus tricked crypto-exchange developers into downloading the hard-to-detect malware.
Malware APT 38 APT 38 ★★
DarkReading.webp 2023-10-02 20:51:09 La Corée du Nord fait passer la méta pour déployer une porte dérobée complexe chez Aerospace Org
North Korea Poses as Meta to Deploy Complex Backdoor at Aerospace Org
(lien direct)
Le logiciel malveillant "LightlessCan" du groupe Lazarus \\ exécute plusieurs commandes Windows natives dans le rat lui-même, ce qui rend la détection beaucoup plus difficile, dit le fournisseur de sécurité.
The Lazarus Group\'s "LightlessCan" malware executes multiple native Windows commands within the RAT itself, making detection significantly harder, security vendor says.
Malware APT 38 ★★★
DarkReading.webp 2020-07-22 15:55:00 North Korea\'s Lazarus Group Developing Cross-Platform Malware Framework (lien direct) The APT group, known for its attack on Sony Pictures in 2014, has created an "advanced malware framework" that can launch and manage attacks against systems running Windows, MacOS, and Linux. Malware APT 38
DarkReading.webp 2020-05-12 16:30:00 DHS, FBI & DoD Report on New North Korean Malware (lien direct) Three new reports detail malware coming out of the Hidden Cobra cyber operations in North Korea. Malware Medical APT 38
DarkReading.webp 2018-11-08 17:45:00 Symantec Uncovers North Korean Group\'s ATM Attack Malware (lien direct) Lazarus Group has been using FastCash Trojan on obsolete AIX servers to empty tens of millions of dollars from ATMs. Malware Medical APT 38
DarkReading.webp 2018-08-23 15:07:00 Lazarus Group Builds its First MacOS Malware (lien direct) This isn't the first time Lazarus Group has infiltrated a cryptocurrency exchange as the hacking team has found new ways to achieve financial gain. Malware Medical APT 38
DarkReading.webp 2018-06-25 18:30:00 Malware in South Korean Cyberattacks Linked to Bithumb Heist (lien direct) Lazarus Group is likely behind a spearphishing campaign containing malicious code to download Manuscrypt malware. Malware Medical Bithumb Bithumb APT 38
Last update at: 2024-05-15 22:08:10
See our sources.
My email:

To see everything: Our RSS (filtrered) Twitter