Src |
Date (GMT) |
Titre |
Description |
Tags |
Stories |
Notes |
 |
2021-06-01 00:00:00 |
Bienvenue à Cyber Skills Welcome to Cyber Skills (lien direct) |
Cyber Skills Launches during an urgent Cyber Security Crisis for Ireland
We are living through a digital revolution and as we watch the world shift most of its systems online, it is becoming increasingly obvious that our data, systems and identities are vulnerable. Whilst we have a growing IT industry, technology rapidly changes and updates leaving all our Industries, from Finance, Industry 4.0, Healthcare etc in a skills gap for Cyber Security.
Welcome to Cyber Skills
Munster Technological University has officially launched Cyber Skills, a new collaborative initiative that address the critical skills shortage of cybersecurity professionals in Ireland – that can be scaled out Internationally. Cyber Skills was awarded a significant amount of funding of €8.1 million from the Human Capital Initiative programme from the Higher Authority of Ireland. Cyber Skills academic partners include Technological University Dublin, University of Limerick, University College Dublin, and the Commonwealth Cyber Initiative based in Virginia Tech in the US. By collaborating with academic institutions the initiative can keep ahead of cyber-criminals in a fast-changing technological environment.
Professor Donna O\'Shea, Chairwoman of Cyber Security at MTU, is the project lead for the initiative. As an expert in Cyber Security, Donna feels:
“Cybersecurity professionals are a company\'s best line of defence in a threat landscape that has become increasingly complex.”
Cyber Skills works closely with Industry in order to gain insights into the needs of the Cyber Security workplace. This is to ensure that pathways, modules and credentials are designed in a way that targets up-skilling and re-skilling efficiently in order to produce workplace-ready graduates.
Cyber Skills at its core has a mission of empowering IT professionals to up skill themselves flexibly. There is a strong awareness of how busy life has become for most people which is why Cyber Skills is incorporating fully online delivery and the use of the first Cyber Range in Ireland where learners can test their new skills. An added benefit is that these innovative delivery methods mean these programmes can be scaled regionally, nationally, and even internationally.
What highlights the necessity for Cyber Skills is the eagerness of Industry partners to link with the initiative. Dell Technologies and Mastercard have come on board and are helping to develop three academic pathways which include certificates in Secure Network Operations, Secure Software Development, and Secure Software Architecture. Their staff are some of the first students to come on to Cyber Skills and will be some of the first graduates of the pathways.
The Launch
Cyber Skills hosted its official launch, virtually on June 1st at 10:30am. The hour-long launch came live from the VE Studios Cork where industry partners, cyber security researchers and university project partners took the viewer through the importance of addressing cyber skills shortages in Ireland and the benefits this project will have to industry both nationally and internationally.
The launch was hosted by Professor Donna O\'Shea joined by Dr. Eoin Byrne, Cluster Manager of Cyber Ireland. Eoin led the first panel discussion with project partners Prof. Joseph Walsh Munster Technological University, Dr. Anthony Keane TU Dublin, Dr. Thomas Newe University of Limerick and Dr. Ray Genoe University College Dublin. The MC for the event was Cyber Skills Project Manager Jacqueline Kehoe. The agenda included fireside chats and panel discussions with project partners, Bob Savage from Dell and Brendan Gormley from Mastercard. There was also a fireside chat with Vivienne Patterson Head of Skills and Engagement at Higher Education Authority. To see the Launch recording check out the link on YouTube.
https://www.youtube.com/watch?v=C22TZrui6SI
Cyber Skills is an ongoing initiative, pathways and micro-credentials can be enrolled in twice a year with no specific order. IT Professionals can start semester 2 in January and then take semester 1 o |
Threat
Medical
|
|
★★★
|
 |
2021-05-24 10:23:01 |
Researchers Link CryptoCore Attacks On Cryptocurrency Exchanges to North Korea (lien direct) |
State-sponsored hackers affiliated with North Korea have been behind a slew of attacks on cryptocurrency exchanges over the past three years, new evidence has revealed.
Attributing the attack with "medium-high" likelihood to the Lazarus Group (aka APT38 or Hidden Cobra), researchers from Israeli cybersecurity firm ClearSky said the campaign, dubbed "CryptoCore," targeted crypto exchanges in |
Medical
|
APT 38
APT 28
|
|
 |
2021-04-27 17:24:00 |
Anomali Cyber Watch: HabitsRAT Targeting Linux and Windows Servers, Lazarus Group Targetting South Korean Orgs, Multiple Zero-Days and More (lien direct) |
The various threat intelligence stories in this iteration of the Anomali Cyber Watch discuss the following topics: APT, Android Malware, RATs, Phishing, QLocker Ransomware and Vulnerabilities. The IOCs related to these stories are attached to Anomali Cyber Watch and can be used to check your logs for potential malicious activity.
Figure 1 - IOC Summary Charts. These charts summarize the IOCs attached to this magazine and provide a glimpse of the threats discussed.
Trending Cyber News and Threat Intelligence
Zero-day Vulnerabilities in SonicWall Email Security Actively Exploited
(published: April 21, 2021)
US cybersecurity company SonicWall said fixes have been published to resolve three critical issues in its email security solution that are being actively exploited in the wild. The vulnerabilities are tracked as CVE-2021-20021, CVE-2021-20022, and CVE-2021-20023, impacting SonicWall ES/Hosted Email Security (HES) versions 10.0.1 and above.
Analyst Comment: The patches for these vulnerabilities have been issued and should be applied as soon as possible to avoid potential malicious behaviour. SonicWall’s security notice can be found here https://www.sonicwall.com/support/product-notification/security-notice-sonicwall-email-security-zero-day-vulnerabilities/210416112932360/. It is important that your company has patch-maintenance policies in place. Once a vulnerability has been publicly reported,, threat actors will likely attempt to incorporate the exploitation of the vulnerability into their malicious operations. Patches should be reviewed and applied as soon as possible to prevent potential malicious activity.
MITRE ATT&CK: [MITRE ATT&CK] Remote File Copy - T1105 | [MITRE ATT&CK] File and Directory Discovery - T1083
Tags: CVE-2021-20021, CVE-2021-20023, CVE-2021-20022
Massive Qlocker Ransomware Attack Uses 7zip to Encrypt QNAP Devices
(published: April 21, 2021)
The ransomware is called Qlocker and began targeting QNAP devices on April 19th, 2021. All victims are told to pay 0.01 Bitcoins, which is approximately $557.74, to get a password for their archived files. While the files are being locked, the Resource Monitor will display numerous '7z' processes which are the 7zip command-line executable.
Analyst Comment: Attackers are using legitimate tools like 7zip to evade detections by traditional antiviruses. EDR solutions can help tracking suspicious command line arguments and process creations to potentially detect such attacks. Customers should use backup solutions to be able recover encrypted files.
MITRE ATT&CK: [MITRE ATT&CK] Credentials in Files - T1081
Tags: Tor, Qlocker, CVE-2020-2509, CVE-2020-36195
Novel Email-Based Campaign Targets Bloomberg Clients with RATs
(published: April 21, 2021)
A new e-mail-based campaign by an emerging threat actor aims to spread various remote access trojans (RATs) to a very specific group of targets who use Bloomberg's industry-based services. Attacks start in the form of targeted emails to c |
Ransomware
Malware
Tool
Vulnerability
Threat
Medical
|
Wannacry
Wannacry
APT 38
APT 28
|
|
 |
2021-04-19 22:33:45 |
Lazarus APT Hackers are now using BMP images to hide RAT malware (lien direct) |
A spear-phishing attack operated by a North Korean threat actor targeting its southern counterpart has been found to conceal its malicious code within a bitmap (.BMP) image file to drop a remote access trojan (RAT) capable of stealing sensitive information.
Attributing the attack to the Lazarus Group based on similarities to prior tactics adopted by the adversary, researchers from Malwarebytes |
Malware
Threat
Medical
|
APT 38
|
|
 |
2021-03-23 14:00:00 |
Anomali Cyber Watch: APT, Malware, Vulnerabilities and More. (lien direct) |
The various threat intelligence stories in this iteration of the Anomali Cyber Watch discuss the following topics: BlackRock, CopperStealer, Go, Lazarus, Mirai, Mustang Panda, Rust, Tax Season, and Vulnerabilities. The IOCs related to these stories are attached to Anomali Cyber Watch and can be used to check your logs for potential malicious activity.
Figure 1 - IOC Summary Charts. These charts summarize the IOCs attached to this magazine and provide a glimpse of the threats discussed.
Trending Cyber News and Threat Intelligence
Bogus Android Clubhouse App Drops Credential-Swiping Malware
(published: March 19, 2021)
Researchers are warning of a fake version of the popular audio chat app Clubhouse, which delivers malware that steals login credentials for more than 450 apps. Clubhouse has burst on the social media scene over the past few months, gaining hype through its audio-chat rooms where participants can discuss anything from politics to relationships. Despite being invite-only, and only being around for a year, the app is closing in on 13 million downloads. The app is only available on Apple's App Store mobile application marketplace - though plans are in the works to develop one.
Analyst Comment: Use only the official stores to download apps to your devices. Be wary of what kinds of permissions you grant to applications. Before downloading an app, do some research.
MITRE ATT&CK: [MITRE ATT&CK] Remote File Copy - T1105
Tags: LokiBot, BlackRock, Banking, Android, Clubhouse
Trojanized Xcode Project Slips XcodeSpy Malware to Apple Developers
(published: March 18, 2021)
Researchers from cybersecurity firm SentinelOne have discovered a malicious version of the legitimate iOS TabBarInteraction Xcode project being distributed in a supply-chain attack. The malware, dubbed XcodeSpy, targets Xcode, an integrated development environment (IDE) used in macOS for developing Apple software and applications. The malicious project is a ripped version of TabBarInteraction, a legitimate project that has not been compromised. Malicious Xcode projects are being used to hijack developer systems and spread custom EggShell backdoors.
Analyst Comment: Researchers attribute this new targeting of Apple developers to North Korea and Lazarus group: similar TTPs of compromising developer supply chain were discovered in January 2021 when North Korean APT was using a malicious Visual Studio project. Moreover, one of the victims of XcodeSpy is a Japanese organization regularly targeted by North Korea. A behavioral detection solution is required to fully detect the presence of XcodeSpy payloads.
MITRE ATT&CK: [MITRE ATT&CK] Remote File Copy - T1105 | [MITRE ATT&CK] Security Software Discovery - T1063 | [MITRE ATT&CK] Obfuscated Files or Information - T1027
Tags: Lazarus, XcodeSpy, North Korea, EggShell, Xcode, Apple
Cybereason Exposes Campaign Targeting US Taxpayers with NetWire and Remcos Malware
(published: March 18, 2021)
Cybereason detected a new campaig |
Ransomware
Malware
Tool
Threat
Patching
Medical
|
APT 38
APT 28
|
|
 |
2021-02-26 03:02:08 |
North Korean Hackers Targeting Defense Firms with ThreatNeedle Malware (lien direct) |
A prolific North Korean state-sponsored hacking group has been tied to a new ongoing espionage campaign aimed at exfiltrating sensitive information from organizations in the defense industry.
Attributing the attacks with high confidence to the Lazarus Group, the new findings from Kaspersky signal an expansion of the APT actor's tactics by going beyond the usual gamut of financially-motivated |
Malware
Medical
|
APT 38
|
★★
|
 |
2021-02-25 16:49:06 |
North Korean hackers find another new target: The defense industry (lien direct) |
The Lazarus group had a busy 2020, and 2021 is shaping up to be another devastatingly productive year for one of the most dangerous hacking groups on the planet. |
Medical
|
APT 38
APT 28
|
|
 |
2021-02-17 18:20:28 |
(Déjà vu) U.S. Accuses North Korean Hackers of Stealing Millions (lien direct) |
The feds have expanded the list of financial and political hacking crimes they allege are linked to Lazarus Group and North Korea. |
Medical
|
APT 38
APT 28
|
|
 |
2021-01-29 14:49:07 |
Microsoft: North Korea-linked Zinc APT targets security experts (lien direct) |
Microsoft, like Google TAG, observed a cyber espionage campaign aimed at vulnerability researchers that attributed to North Korea-linked Zinc APT group. Researchers from Microsoft monitored a cyber espionage campaign aimed at vulnerability researchers and attributed the attacks to North Korea-linked Zinc APT group. “In recent months, Microsoft has detected cyberattacks targeting security researchers by an […]
|
Vulnerability
Medical
|
APT 38
|
|
 |
2021-01-28 14:47:45 |
Microsoft: DPRK hackers \'likely\' hit researchers with Chrome exploit (lien direct) |
Today, Microsoft disclosed that they have also been monitoring the targeted attacks against vulnerability researchers for months and have attributed the attacks to a DPRK group named 'Zinc.' [...] |
Vulnerability
Medical
|
APT 38
|
|
 |
2020-12-24 12:00:11 |
North Korean state hackers breach COVID-19 research entities (lien direct) |
North Korean nation-state hackers tracked as the Lazarus Group have recently compromised organizations involved in COVID-19 research and vaccine development. [...] |
Medical
|
APT 38
APT 28
|
|
 |
2020-12-23 23:24:40 |
North Korean Hackers Trying to Steal COVID-19 Vaccine Research (lien direct) |
Threat actors such as the notorious Lazarus group are continuing to tap into the ongoing COVID-19 vaccine research to steal sensitive information to speed up their countries' vaccine-development efforts.
Cybersecurity firm Kaspersky detailed two incidents at a pharmaceutical company and a government ministry in September and October leveraging different tools and techniques but exhibiting |
Threat
Medical
|
APT 38
APT 28
|
|
 |
2020-12-23 10:00:08 |
Lazarus covets COVID-19-related intelligence (lien direct) |
As the COVID-19 crisis grinds on, some threat actors are trying to speed up vaccine development by any means available. We have found evidence that actors, such as the Lazarus group, are going after intelligence that could help these efforts by attacking entities related to COVID-19 research. |
Threat
Medical
|
APT 38
APT 28
|
|
 |
2020-12-03 04:01:42 |
How to Protect Your Business From Multi-Platform Malware Systems (lien direct) |
The Lazarus Group (also known as Guardians of Peace or Whois) is a notorious cybercrime gang made up of unknown individuals. According to the United States Federal Bureau of Investigations, the group is a North Korean “state-sponsored hacking organization.” However, some believe that their connections to North Korea might be a false flag intending to […]… Read More
|
Malware
Medical
|
APT 38
|
|
 |
2020-11-17 14:10:55 |
Hackers Pose As WHO Officials To Attack COVID-19 Vaccines (lien direct) |
Pharmaceutical companies researching treatments and vaccines for COVID-19 are being actively targeted by prominent nation state-backed hackers from Russia and North Korea, according to IT Pro. Groups including Strontium, Zinc…
The ISBuzz Post: This Post Hackers Pose As WHO Officials To Attack COVID-19 Vaccines |
Medical
|
APT 38
APT 28
|
|
 |
2020-11-17 11:19:05 |
COVID-19 vaccine research firms targeted by Russian and North Korean hackers (lien direct) |
Microsoft has recently alerted governments across the globe that the North Korean hacker groups Cerium and Zinc, as well as the Russian hacker group Strontium, have been targeting organisations involved in COVID-19 vaccine research using brute-force, credential stuffing and spear-phishing attacks. Tom Burt, Microsoft’s Corporate Vice President for Customer Security & Trust, said in a […]
|
Medical
|
APT 38
APT 28
APT 43
|
|
 |
2020-11-16 18:23:36 |
Hacked Security Software Used in Novel South Korean Supply-Chain Attack (lien direct) |
Lazarus Group is believed to be behind a spate of attacks that leverage stolen digital certificates tied to browser software that secures communication with government and financial websites in South Korea. |
Medical
|
APT 38
|
|
 |
2020-11-16 15:18:44 |
Lazarus malware delivered to South Korean users via supply chain attacks (lien direct) |
North Korea-linked Lazarus APT group is behind new campaigns against South Korean supply chains that leverage stolen security certificates. Security experts from ESET reported that North-Korea-linked Lazarus APT (aka HIDDEN COBRA) is behind cyber campaigns targeting South Korean supply chains. According to the experts the nation-state actors leverage stolen security certificates from two separate, legitimate South […]
|
Malware
Medical
|
APT 38
|
|
 |
2020-11-16 12:34:50 |
Lazarus Group Used Supply Chain Attack to Target South Korean Users with Malware (lien direct) |
The Lazarus group leveraged a supply chain attack to target users located in South Korea with custom malware. On November 16, ESET disclosed that the Lazarus group conducted its supply chain attack by abusing WIZVERA VeraPort. This application helps users in South Korea manage the installation of additional computer security software when they visit a […]… Read More
|
Malware
Medical
|
APT 38
|
|
 |
2020-11-16 02:29:40 |
Trojanized Security Software Hits South Korea Users in Supply-Chain Attack (lien direct) |
Cybersecurity researchers took the wraps off a novel supply chain attack in South Korea that abuses legitimate security software and stolen digital certificates to distribute remote administration tools (RATs) on target systems.
Attributing the operation to the Lazarus Group, also known as Hidden Cobra, Slovak internet security company ESET said the state-sponsored threat actor leveraged the |
Threat
Medical
|
APT 38
|
|
 |
2020-11-13 17:18:12 |
Three APT groups have targeted at least seven COVID-19 vaccine makers (lien direct) |
At least the three nation-state actors have targeted seven COVID-19 vaccine makers, they are Strontium, Lazarus Group, and Cerium, Microsoft warns. Microsoft revealed that at least three APT groups have targeted seven companies involved in COVID-19 vaccines research and treatments. “In recent months, we've detected cyberattacks from three nation-state actors targeting seven prominent companies directly […]
|
Medical
|
APT 38
APT 28
APT 43
|
|
 |
2020-11-13 14:00:00 |
Microsoft says three APTs have targeted seven COVID-19 vaccine makers (lien direct) |
The three state-sponsored hacker groups (APTs) are Russia's Strontium (Fancy Bear) and North Korea's Zinc (Lazarus Group) and Cerium. |
Medical
|
APT 38
APT 28
APT 43
|
|
 |
2020-10-06 14:00:00 |
Weekly Threat Briefing: Ransomware, IPStorm, APT Group, and More (lien direct) |
The various threat intelligence stories in this iteration of the Weekly Threat Briefing discuss the following topics: APT, BlackTech, BLINDINGCAN, Linux Malware, Palmerworm, Vulnerabilities, and XDSpy. The IOCs related to these stories are attached to the Weekly Threat Briefing and can be used to check your logs for potential malicious activity.
Figure 1 - IOC Summary Charts. These charts summarize the IOCs attached to this magazine and provide a glimpse of the threats discussed.
Trending Cyber News and Threat Intelligence
Grindr Fixed a Bug Allowing Full Takeover of Any User Account
(published: October 3, 2020)
Grindr, an LGBT networking platform, has fixed a vulnerability that could allow any account to be hijacked. The vulnerability was identified by security researcher Wassime Bouimadaghene, finding that the reset token was leaked in the page’s response content. This would enable anyone who knows a users’ email address to generate the reset link that is sent via email. Gaining account access would enable an attacker to obtain sensitive information such as pictures stored on the app (including NSFW), HIV status, location, and messages. Grindr has announced a bug bounty program.
Recommendation: If your account has been breached, you can reset the password using the reset link sent to the associated email address.
Tags: Browser, Exposed tokens, Grindr, Sensitive Info
XDSpy: Stealing Government Secrets Since 2011
(published: October 2, 2020)
Security researchers from ESET have identified a new Advanced Persistent Threat (APT) group that has been targeting Eastern European governments and businesses for up to nine years. Dubbed “XDSpy,” ESET was unable to identify any code similarity or shared infrastructure with other known groups and believe the group operates in a UTC+2 or UTC+3 time zone, Monday to Friday. XDSpy mainly uses spearphishing emails with some variance, some will contain attachments or links to malicious files, usually a ZIP or RAR archive. When the malicious file has infected a victim, it will install “XDDown,” a downloader that will begin to install additional plugins that will begin to exfiltrate files, passwords, and nearby SSIDs. XDSpy has also been observed using “CVE-2020-0968” (Internet Explorer legacy JavaScript vulnerability) bearing some resemblance to DarkHotel campaigns and Operation Domino, ESET do not believe these campaigns are related but may be using the same exploit broker.
Recommendation: Defense-in-depth (layering of security mechanisms, redundancy, fail-safe defense processes) is the best way to ensure safety from APTs, including a focus on both network and host-based security. Prevention and detection capabilities should also be in place. Furthermore, all employees should be educated on the risks of spearphishing and how to identify such attempts.
MITRE ATT&CK: [MITRE ATT&CK] Exploitation for Client Execution - T1203 | [MITRE ATT&CK] System Owner/User Discovery - T1033 | [MITRE ATT&CK] System Information Discovery - T1082 | [MITRE ATT&CK] System Information Discovery - T1082 | [MITRE ATT&CK] File and Directory Discovery |
Ransomware
Malware
Vulnerability
Threat
Medical
|
APT 38
|
★★★★★
|
 |
2020-09-09 16:24:00 |
Weekly Threat Briefing: Skimmer, Ransomware, APT Group, and More (lien direct) |
The various threat intelligence stories in this iteration of the Weekly Threat Briefing discuss the following topics: APT, Baka, DDoS, Netwalker, PyVil, Windows Defender, TA413, and Vulnerabilities. The IOCs related to these stories are attached to the Weekly Threat Briefing and can be used to check your logs for potential malicious activity.
Figure 1 - IOC Summary Charts. These charts summarize the IOCs attached to this magazine and provide a glimpse of the threats discussed.
Trending Cyber News and Threat Intelligence
‘Baka’ Javascript Skimmer Identified
(published: September 6, 2020)
Visa have issued a security alert based on identification of a new skimmer, named “Baka”. Based on analysis by Visa Payment Fraud Disruption, the skimmer appears to be more advanced, loading dynamically and using an XOR cipher for obfuscation. The attacks behind Baka are injecting it into checkout pages using a script tag, with the skimming code downloading from the Command and Control (C2) server and executing in memory to steal customer data.
Recommendation: eCommerce site owners must take every step necessary to secure their data and safeguard their payment card information. Visa has also released best practices in the security advisory.
Tags: Baka, Javascript, Skimmer
Netwalker Ransomware Hits Argentinian Government, Demands $4 Million
(published: September 6, 2020)
The Argentinian immigration agency, Dirección Nacional de Migaciones suffered a ransomware attack that shut down border crossings. After receiving many tech support calls, the computer networks were shut down to prevent further spread of the ransomware, which led to a cecission in border crossings until systems were up again. The ransomware used in this attack is Netwalker ransomware, that left a ransom note demanding initalling $2 million, however when this wasn’t paid in the first week, the ransom increased to $4 million.
Recommendation: Ransomware can potentially be blocked by using endpoint protection solutions (HIDS). Always keep your important files backed up following the 3-2-1 rule: have at least 3 different copies, on 2 different mediums, with 1 off-site. In the case of ransomware infection, the affected system must be wiped and reformatted. Other devices on the network should be checked for similar infections. Always check for a decryptor before considering payment; avoid payment at all costs. Ransomware should be reported to law enforcement agencies who are doing their best to track these actors and prevent ransom from being a profitable business for cyber criminals.
MITRE ATT&CK: [MITRE ATT&CK] Data Encrypted for Impact - T1486
Tags: Argentina, Government, Netwalker, Ransomware
No Rest for the Wicked: Evilnum Unleashes PyVil RAT
(published: September 3, 2020)
Researchers on the Cybereason Nocturnus team have published their research tracking the threat actor group known as Evilnum, and an ongoing change in their tooling and attack procedures. This includes a new Remote Access Trojan (RAT), written in python that they have begun to use. The actor group attacks targets in the financial services sector using highly targeted spearphishing. The phishing lures leverage "Know Your Customer" (KY |
Ransomware
Malware
Tool
Vulnerability
Threat
Medical
|
APT 38
APT 28
|
★★★★
|
 |
2020-08-26 06:43:13 |
Lazarus APT targets cryptocurrency organizations with using LinkedIn lures (lien direct) |
North Korea-linked Lazarus APT group targets cryptocurrency organizations with fake job offers in an ongoing spear-phishing campaign. North Korea-linked Lazarus APT group (aka HIDDEN COBRA) has been observed while using LinkedIn lures in a spear-phishing campaign targeting the cryptocurrency organizations worldwide, including in the United States, the United Kingdom, Germany, Singapore, the Netherlands, Japan. The activity of […]
|
Medical
|
APT 38
|
|
 |
2020-07-28 12:15:00 |
North Korean hackers created VHD ransomware for enterprise attacks (lien direct) |
North Korean-backed hackers tracked as the Lazarus Group have developed and are actively using VHD ransomware against enterprise targets according to a report published by Kaspersky researchers today. [...] |
Ransomware
Medical
|
APT 38
|
|
 |
2020-07-23 14:46:05 |
New MATA Multi-platform malware framework linked to NK Lazarus APT (lien direct) |
North Korea-linked Lazarus APT Group has used a new multi-platform malware framework, dubbed MATA, to target entities worldwide The notorious Lazarus Group is using a new multi-platform malware framework, dubbed MATA, in attacks aimed at organizations worldwide, to deploy Kaspersky researchers observed that MATA was used by the threat actors to distribute ransomware (i.e. VHD […]
|
Ransomware
Malware
Threat
Medical
|
APT 38
|
|
 |
2020-07-23 02:18:46 |
North Korean Hackers Spotted Using New Multi-Platform Malware Framework (lien direct) |
Lazarus Group, the notorious hacking group with ties to the North Korean regime, has unleashed a new multi-platform malware framework with an aim to infiltrate corporate entities around the world, steal customer databases, and distribute ransomware.
Capable of targeting Windows, Linux, and macOS operating systems, the MATA malware framework - so-called because of the authors' reference to the |
Malware
Medical
|
APT 38
|
|
 |
2020-07-06 12:28:02 |
(Déjà vu) Comment: North Korean Hackers Linked to Credit Card Stealing Attacks on US Stores (lien direct) |
Hackers from North Korea have been stealing payment card information from customers of large retailers in the U.S. and Europe for at least a year, reveals new research released today. The fraudulent activity, which researchers attribute to the Lazarus (Hidden Cobra) group of nation-state hackers, used legitimate websites to exfiltrate the stolen credit card data and …
The ISBuzz Post: This Post Comment: North Korean Hackers Linked to Credit Card Stealing Attacks on US Stores |
Medical
|
APT 38
|
|
 |
2020-05-12 16:30:00 |
DHS, FBI & DoD Report on New North Korean Malware (lien direct) |
Three new reports detail malware coming out of the Hidden Cobra cyber operations in North Korea. |
Malware
Medical
|
APT 38
|
|
 |
2020-05-12 11:36:58 |
US govt exposes new North Korean malware, phishing attacks (lien direct) |
The US government today released information on three new malware variants used in malicious cyber activity campaigns by a North Korean government-backed hacker group tracked as HIDDEN COBRA. [...] |
Malware
Medical
|
APT 38
|
|
 |
2020-05-09 22:14:52 |
North Korea-linked Lazarus APT uses a Mac variant of the Dacls RAT (lien direct) |
North Korea-linked Lazarus APT group employed a Mac variant of the Dacls Remote Access Trojan (RAT) in recent attacks. North Korea-linked Lazarus APT already used at least two macOS malware in previous attacks, now researchers from Malwarebytes have identified a new Mac variant of the Linux-based Dacls RAT. The activity of the Lazarus APT group (aka HIDDEN COBRA) […]
|
Malware
Medical
|
APT 38
|
|
 |
2020-05-09 12:39:40 |
North Korean hackers infect real 2FA app to compromise Macs (lien direct) |
Hackers have hidden malware in a legitimate two-factor authentication (2FA) app for macOS to distribute Dacls, a remote access trojan associated with the North Korean Lazarus group. [...] |
Malware
Medical
|
APT 38
|
|
 |
2020-05-08 15:16:23 |
(Déjà vu) Comment: Lazarus Group Hides macOS Spyware In 2FA Application (lien direct) |
The North Korea-linked cyberthreat group known as Lazarus Group has added a new variant of the Dacls remote-access trojan (RAT) to its arsenal of spy gear, designed specifically for the Mac operating system. Dacls was first discovered last December targeting Windows and Linux platforms. The new version for Mac is now spreading via a trojanized two-factor …
The ISBuzz Post: This Post Comment: Lazarus Group Hides macOS Spyware In 2FA Application |
Medical
|
APT 38
|
|
 |
2020-05-07 09:56:52 |
Lazarus macOS Spyware hidden in Two-Factor Authentication Application (lien direct) |
The Dacls RAT has been ported from an existing Linux version. The North Korea-linked cyberthreat group known as Lazarus Group has added a new variant of the Dacls remote-access trojan (RAT) to its arsenal of spy gear, designed specifically for the Mac operating system. Dacls was first discovered last December targeting Windows and Linux platforms. […]
|
Medical
|
APT 38
|
|
 |
2020-05-06 15:59:36 |
New Mac variant of Lazarus Dacls RAT distributed via Trojanized 2FA app (lien direct) |
The Lazarus group improves their toolset with a new RAT specifically designed for the Mac.
Categories:
Mac
Malware
Threat analysis
Tags: APTDaclsLazarusmacmalwarerattinkaOTP
(Read more...)
|
Medical
|
APT 38
|
|
 |
2020-03-02 17:35:17 |
US Charges Two With Laundering $100M for North Korean Hackers (lien direct) |
Two Chinese nationals were charged today by the US Dept of Justice and sanctioned by the US Treasury for allegedly laundering over $100 million worth of cryptocurrency out of the nearly $250 million stolen by North Korean actors known as Lazarus Group after hacking a cryptocurrency exchange in 2018. [...] |
Medical
|
APT 38
|
|
 |
2020-02-25 12:00:00 |
North Korea Is Recycling Mac Malware. That\'s Not the Worst Part (lien direct) |
Lazarus Group hackers have long plagued the internet-using at least one tool they picked up just by looking around online. |
Tool
Medical
|
APT 38
|
|
 |
2020-02-14 21:07:17 |
US Govt agencies detail North Korea-linked HIDDEN COBRA malware (lien direct) |
The Federal Bureau of Investigation (FBI) and Cybersecurity and Infrastructure Security Agency (CISA) released reports on North Korea-linked HIDDEN COBRA malware. The FBI, the US Cyber Command, and the Department of Homeland Security have published technical details of a new North-Korea linked hacking operation. The government experts released new and updated Malware Analysis Reports (MARs) […]
|
Malware
Medical
|
APT 38
|
|
 |
2019-12-17 13:05:00 |
Lazarus Hackers Target Linux, Windows With New Dacls Malware (lien direct) |
A new Remote Access Trojan (RAT) malware dubbed Dacls and connected to the Lazarus Group has been spotted by researchers while being used to target both Windows and Linux devices. [...] |
Malware
Medical
|
APT 38
|
|
 |
2019-12-10 17:00:00 |
New fileless malware for macOS linked to Lazarus Group (lien direct) |
The new malware sample bears similarities to the well-known AppleJeus malware, which targets cryptocurrency exchanges. AppleJeus is the product of Lazarus Group, a shadowy cybercrime organization believed by many to be linked to North Korea.
|
Malware
Medical
|
APT 38
|
|
 |
2019-10-31 16:15:13 |
Experts Reactions On North Korean Malware Found On Indian Nuclear Plants Network (lien direct) |
It has been reported the network of one of India’s nuclear power plants was infected with malware created by North Korea’s state-sponsored hackers, the Nuclear Power Corporation of India Ltd (NPCIL) confirmed today. Several security researchers identified the malware as a version of Dtrack, a backdoor trojan developed by the Lazarus Group, North Korea’s elite hacking unit. There …
The ISBuzz Post: This Post Experts Reactions On North Korean Malware Found On Indian Nuclear Plants Network |
Malware
Medical
|
APT 38
|
|
 |
2019-10-25 06:49:12 |
Experts attribute NukeSped RAT to North Korea-Linked hackers (lien direct) |
Experts at Fortinet analyzed NukeSped malware samples that share multiple similarities with malware associated with North Korea-linked APTs. Fortinet has analyzed the NukeSped RAT that is believed to be a malware in the arsenal of the Lazarus North-Korea linked APT group. The attribution to the Lazarus group is based on the similarities with other malware […]
|
Malware
Medical
|
APT 38
|
|
 |
2019-09-24 18:56:47 |
North Korean-Linked Dtrack RAT Discovered (lien direct) |
An investigation into banking malware targeting India has led to the discovery of a new remote access Trojan (RAT) employed by the North Korean-linked Lazarus group, Kaspersky reports.
|
Malware
Medical
|
APT 38
|
|
 |
2019-09-13 20:21:12 |
The US Treasury placed sanctions on North Korea linked APT Groups (lien direct) |
The US Treasury placed sanctions on three North Korea-linked hacking groups, the Lazarus Group, Bluenoroff, and Andarial. The US Treasury sanctions on three North Korea-linked hacking groups, the Lazarus Group, Bluenoroff, and Andarial. The groups are behind several hacking operations that resulted in the theft of hundreds of millions of dollars from financial institutions and cryptocurrency exchanges […]
|
Medical
|
APT 38
|
|
 |
2019-09-13 16:47:00 |
US Treasury sanctions three North Korean hacking groups (lien direct) |
US wants to seize financial assets associated with the Lazarus Group, Bluenoroff, and Andarial. |
Medical
|
APT 38
|
|
 |
2019-09-13 15:00:00 |
US Sanctions 3 Cyber Attack Groups Tied to DPRK (lien direct) |
Lazarus Group, Bluenoroff, and Andariel were named and sanctioned by the US Treasury for ongoing attacks on financial systems. |
Medical
|
APT 38
|
|
 |
2019-05-13 18:50:03 |
US Government Unveils New North Korean Hacking Tool (lien direct) |
It has been reported that yesterday the Department of Homeland Security and the FBI publicly identified a new North Korean malware capable of funnelling information from a victim’s computer network. Dubbed ElectricFish by government officials, the malware is the latest tool in North Korea’s hacking program, referred to as Hidden Cobra. The U.S. Cyber Emergency Response Team published a report warning the public …
The ISBuzz Post: This Post US Government Unveils New North Korean Hacking Tool |
Malware
Tool
Medical
|
APT 38
|
|
 |
2019-05-10 13:53:03 |
DHS and FBI published a Malware Analysis Report on North Korea-linked tool ELECTRICFISH (lien direct) |
The U.S. Department of Homeland Security (DHS) and the FCI published a new joint report on ELECTRICFISH, a malware used by North Korea. US DHS and the Federal Bureau of Investigation (FBI) conducted a joint analysis of a traffic tunneling tool dubbed ELECTRICFISH used by North Korea-linked APT group tracked as Hidden Cobra (aka Lazarus). It […]
|
Malware
Tool
Medical
|
APT 38
|
|
 |
2019-05-10 03:04:03 |
North Korean Hackers Using ELECTRICFISH Tunnels to Exfiltrate Data (lien direct) |
The U.S. Department of Homeland Security (DHS) and the FBI have issued another joint alert about a new piece of malware that the prolific North Korean APT hacking group Hidden Cobra has actively been using in the wild.
Hidden Cobra, also known as Lazarus Group and Guardians of Peace, is believed to be backed by North Korean government and known to launch cyber attacks against media |
Malware
Medical
|
APT 38
|
|