Src |
Date (GMT) |
Titre |
Description |
Tags |
Stories |
Notes |
 |
2020-11-13 17:18:12 |
Three APT groups have targeted at least seven COVID-19 vaccine makers (lien direct) |
At least the three nation-state actors have targeted seven COVID-19 vaccine makers, they are Strontium, Lazarus Group, and Cerium, Microsoft warns. Microsoft revealed that at least three APT groups have targeted seven companies involved in COVID-19 vaccines research and treatments. “In recent months, we've detected cyberattacks from three nation-state actors targeting seven prominent companies directly […]
|
Medical
|
APT 38
APT 28
APT 43
|
|
 |
2020-11-13 14:00:00 |
Microsoft says three APTs have targeted seven COVID-19 vaccine makers (lien direct) |
The three state-sponsored hacker groups (APTs) are Russia's Strontium (Fancy Bear) and North Korea's Zinc (Lazarus Group) and Cerium. |
Medical
|
APT 38
APT 28
APT 43
|
|
 |
2020-11-12 05:52:48 |
CRAT wants to plunder your endpoints (lien direct) |
By Asheer Malhotra.
Cisco Talos has observed a new version of a remote access trojan (RAT) family known as CRAT.Apart from the prebuilt RAT capabilities, the malware can download and deploy additional malicious plugins on the infected endpoint.One of the plugins is a ransomware known as "Hansom."CRAT has been attributed to the Lazarus APT Group in the past.The RAT consists of multiple obfuscation techniques to hide strings, API names, command and control (C2) URLs and instrumental functions,...
[[ This is only the beginning! Please visit the blog for the complete entry ]] |
Ransomware
Malware
|
APT 38
|
|
 |
2020-11-03 14:20:02 |
The Danny Ocean of Social Engineer\'s (lien direct) |
In This Issue, "The Danny Ocean of Social Engineer's." Shelby Dacko, Human Risk Analyst with Social‐Engineer, LLC., shares her story of entering the field of professional social engineering.
|
|
APT 32
|
|
 |
2020-11-03 03:49:37 |
New Kimsuky Module Makes North Korean Spyware More Powerful (lien direct) |
A week after the US government issued an advisory about a "global intelligence gathering mission" operated by North Korean state-sponsored hackers, new findings have emerged about the threat group's spyware capabilities.
The APT - dubbed "Kimsuky" (aka Black Banshee or Thallium) and believed to be active as early as 2012 - has been now linked to as many as three hitherto undocumented malware, |
Threat
Cloud
|
APT 37
|
|
 |
2020-11-02 16:40:03 |
North Korea-Linked APT Group Kimsuky spotted using new malware (lien direct) |
North Korea-linked APT group Kimsuky was recently spotted using a new piece of malware in attacks on government agencies and human rights activists. North Korea-linked cyber espionage group Kimsuky (aka Black Banshee, Thallium, Velvet Chollima) was recently observed using a new malware in attacks aimed at government agencies and human rights activists. The Kimsuky APT […]
|
Malware
Cloud
|
APT 37
|
|
 |
2020-10-29 15:21:08 |
Expert Reacted On Microsoft Says Iranian Hackers “Phosphorus” Targeted Conference Attendees (lien direct) |
Microsoft says it detected and worked to stop a series of cyberattacks from the threat actor Phosphorous masquerading as conference organizers to target more than 100 high-profile individuals. Phosphorus, an Iranian actor, has targeted with this scheme potential attendees of the upcoming Munich Security Conference and the Think 20 (T20) Summit in Saudi Arabia. The …
The ISBuzz Post: This Post Expert Reacted On Microsoft Says Iranian Hackers “Phosphorus” Targeted Conference Attendees |
Threat
Conference
|
APT 35
|
|
 |
2020-10-29 15:00:00 |
How Octopuses Use Their Suction Cups to Taste Through Touch (lien direct) |
A new study reveals that the invertebrates use a novel kind of receptor embedded in their suckers to explore their ocean habitats. |
|
APT 32
|
|
 |
2020-10-29 11:16:42 |
Iran-linked Threat Actor Targets T20 Summit Attendees (lien direct) |
It has been reported that an Iranian threat actor has successfully compromised attendees of two global conferences – including ambassadors and senior policy experts – in an effort to steal their email credentials. Microsoft linked the attack, which targeted more than 100 conference attendees, to Phosphorus, which it said is operating from Iran. The group – also known …
The ISBuzz Post: This Post Iran-linked Threat Actor Targets T20 Summit Attendees |
Threat
Conference
|
APT 35
|
|
 |
2020-10-29 08:28:32 |
Iran-linked Phosphorous APT hacked emails of security conference attendees (lien direct) |
Iran-linked APT group Phosphorus successfully hacked into the email accounts of multiple high-profile individuals and security conference attendees. Microsoft revealed that Iran-linked APT Phosphorus (aka APT35, Charming Kitten, Newscaster, and Ajax Security Team) successfully hacked into the email accounts of multiple high-profile individuals and attendees at this year’s Munich Security Conference and the Think 20 (T20) summit. “Today, we're sharing […]
|
Conference
|
APT 35
|
|
 |
2020-10-27 12:00:00 |
These Oceanographers Want to Turn Marine Slime Into Drugs (lien direct) |
A California team will use a robotic vehicle to study tiny seafloor creatures, hoping they might yield new compounds to fight viruses and cancer. |
|
APT 32
|
★★★★
|
 |
2020-10-15 14:00:00 |
COVID-19 Attacks – Defending Your Organization (lien direct) |
Overview
The Coronavirus 2019 (COVID-19) global pandemic has caused widespread fear of the unknown and deadly aspects of this novel virus, generated growth in certain industries to combat it, and created a shift toward remote work environments to slow the spread of the disease.
Defending Your Organization Against COVID-19 Cyber Attacks. In this webinar, AJ, and I describe COVID-19 attacks in January through March, the groups behind them, and key MITRE ATT&CK techniques being employed. We then discuss ways an organization can keep themselves safe from these types of attacks.
Pandemic Background
COVID-19 is a pandemic viral respiratory disease, originally identified in Wuhan, China in December 2019. At the time of the webinar, it had infected around 1.5 million people worldwide. Within the first month, cyber actors capitalized on the opportunity.
COVID Attack Timeline
December 2019 - January 2020
At the end of December 2019, China alerted the World Health Organization (WHO) that there was an outbreak in Wuhan, China.
Within a month, the first cyber events were being recorded. Around January 31, 2020, malicious emails (T1566.001) using the Emotet malware (S0367) and a phishing campaign (T1566.001) using LokiBot (S0447) were tied to TA542 alias Mummy Spider. Emotet, in particular, was prolific. It originally started as a banking Trojan, then evolved into a delivery mechanism for an initial payload that infected systems to download additional malware families such as TrickBot (S0266). Around this same time, there was a marked increase in the registration of domain names with COVID-19 naming conventions, a key indicator of an uptick in phishing campaigns.
February 2020
In early February, the progression of adversaries using uncertainty about and thirst for information regarding the COVID-19 pandemic became apparent. New malware variants and malware families were reported employing coronavirus related content, including NanoCore RAT (S0336) and Parallax RAT, a newer remote-access Trojan, to infect unsuspecting users. Throughout February, cybercrime actors launched several phishing campaigns (T1566.001) to deliver information stealer AZORult (S0344).
With worldwide government health agencies giving advice on cyber and physical health, threat actors aligned with nation-states such as Russia (Hades APT), China (Mustang Panda), and North Korea (Kimsuky - G0094) used this messaging to lure individuals to download and/or execute malicious files disguised as legitimate documents. These state-sponsored groups used convincing lures to impersonate organizations such as the United Nations (UN), the World Health Organization (WHO), and various public health government agencies to achieve short- and long-term national objectives.
March 2020
In March, we observed a flurry of nation-state and cybercrime attributed malicious activity seeking to exploit the COVID-19 pandemic. Cybercrime actors distributed a range of malware families, including NanoCore (S0336), |
Ransomware
Spam
Malware
Threat
|
APT 36
|
★★★
|
 |
2020-10-06 15:00:00 |
Release the Kraken: Fileless APT attack abuses Windows Error Reporting service (lien direct) |
We discovered a new attack that injected its payload-dubbed "Kraken-into the Windows Error Reporting (WER) service as a defense evasion mechanism.
Categories:
Malware
Malwarebytes news
Threat analysis
Tags: "your right to compensation"APTAPT attacksAPT32APTsCactusTorchcompensation manual.docDotNettoJscriptkrakenkraken.krakenWERWerFault.exeWindow Error ReportingWindows Error Reporting service
(Read more...)
|
|
APT 32
|
|
 |
2020-10-06 14:00:00 |
Weekly Threat Briefing: Ransomware, IPStorm, APT Group, and More (lien direct) |
The various threat intelligence stories in this iteration of the Weekly Threat Briefing discuss the following topics: APT, BlackTech, BLINDINGCAN, Linux Malware, Palmerworm, Vulnerabilities, and XDSpy. The IOCs related to these stories are attached to the Weekly Threat Briefing and can be used to check your logs for potential malicious activity.
Figure 1 - IOC Summary Charts. These charts summarize the IOCs attached to this magazine and provide a glimpse of the threats discussed.
Trending Cyber News and Threat Intelligence
Grindr Fixed a Bug Allowing Full Takeover of Any User Account
(published: October 3, 2020)
Grindr, an LGBT networking platform, has fixed a vulnerability that could allow any account to be hijacked. The vulnerability was identified by security researcher Wassime Bouimadaghene, finding that the reset token was leaked in the page’s response content. This would enable anyone who knows a users’ email address to generate the reset link that is sent via email. Gaining account access would enable an attacker to obtain sensitive information such as pictures stored on the app (including NSFW), HIV status, location, and messages. Grindr has announced a bug bounty program.
Recommendation: If your account has been breached, you can reset the password using the reset link sent to the associated email address.
Tags: Browser, Exposed tokens, Grindr, Sensitive Info
XDSpy: Stealing Government Secrets Since 2011
(published: October 2, 2020)
Security researchers from ESET have identified a new Advanced Persistent Threat (APT) group that has been targeting Eastern European governments and businesses for up to nine years. Dubbed “XDSpy,” ESET was unable to identify any code similarity or shared infrastructure with other known groups and believe the group operates in a UTC+2 or UTC+3 time zone, Monday to Friday. XDSpy mainly uses spearphishing emails with some variance, some will contain attachments or links to malicious files, usually a ZIP or RAR archive. When the malicious file has infected a victim, it will install “XDDown,” a downloader that will begin to install additional plugins that will begin to exfiltrate files, passwords, and nearby SSIDs. XDSpy has also been observed using “CVE-2020-0968” (Internet Explorer legacy JavaScript vulnerability) bearing some resemblance to DarkHotel campaigns and Operation Domino, ESET do not believe these campaigns are related but may be using the same exploit broker.
Recommendation: Defense-in-depth (layering of security mechanisms, redundancy, fail-safe defense processes) is the best way to ensure safety from APTs, including a focus on both network and host-based security. Prevention and detection capabilities should also be in place. Furthermore, all employees should be educated on the risks of spearphishing and how to identify such attempts.
MITRE ATT&CK: [MITRE ATT&CK] Exploitation for Client Execution - T1203 | [MITRE ATT&CK] System Owner/User Discovery - T1033 | [MITRE ATT&CK] System Information Discovery - T1082 | [MITRE ATT&CK] System Information Discovery - T1082 | [MITRE ATT&CK] File and Directory Discovery |
Ransomware
Malware
Vulnerability
Threat
Medical
|
APT 38
|
★★★★★
|
 |
2020-09-17 23:41:21 |
US sanctions Iranian government front company hiding major hacking operations (lien direct) |
US says the Iranian government used the "Rana Intelligence Computing Company" as a front for the APT39 hacking group. |
Prediction
|
APT 39
|
|
 |
2020-09-17 17:10:00 |
Iranian Hackers Indicted for Stealing Aerospace & Satellite Tracking Data (lien direct) |
Also, the US Treasury sanctioned Iranian attack group APT39 following a years-long malware campaign. |
Malware
Prediction
|
APT 39
|
|
 |
2020-09-15 15:00:00 |
Weekly Threat Briefing: APT Group, Malware, Ransomware, and Vulnerabilities (lien direct) |
The various threat intelligence stories in this iteration of the Weekly Threat Briefing discuss the following topics: APT, Conti Ransomware, Cryptominers, Emotet, Linux, US Election, and Vulnerabilities. The IOCs related to these stories are attached to the Weekly Threat Briefing and can be used to check your logs for potential malicious activity.
Figure 1 - IOC Summary Charts. These charts summarize the IOCs attached to this magazine and provide a glimpse of the threats discussed.
Trending Cyber News and Threat Intelligence
China’s ‘Hybrid War’: Beijing’s Mass Surveillance of Australia and the World for Secrets and Scandal
(published: September 14, 2020)
A database containing 2.4 million people has been leaked from a Shenzhen company, Zhenhua Data, believed to have ties to the Chinese intelligence service. The database contains personal information on over 35,000 Australians and prominent figures, and 52,000 Americans. This includes addresses, bank information, birth dates, criminal records, job applications, psychological profiles, and social media. Politicians, lawyers, journalists, military officers, media figures, and Natalie Imbruglia are among the records of Australians contained in the database. While a lot of the information is public, there is also non-public information contributing to claims that China is developing a mass surveillance system.
Recommendation: Users should always remain vigilant about the information they are putting out into the public, and avoid posting personal or sensitive information online.
Tags: China, spying
US Criminal Court Hit by Conti Ransomware; Critical Data at Risk
(published: September 11, 2020)
The Fourth District Court of Louisiana, part of the US criminal court system, appears to have become the latest victim of the Conti ransomware. The court's website was attacked and used to steal numerous court documents related to defendants, jurors, and witnesses, and then install the Conti ransomware. Evidence of the data theft was posted to the dark web. Analysis of the malware by Emsisoft’s threat analyst, Brett Callow, indicates that the ransomware deployed in the attack was Conti, which has code similarity to another ransomware strain, Ryuk. The Conti group, believed to be behind this ransomware as a service, is sophisticated and due to the fact that they receive a large portion of the ransoms paid, they are motivated to avoid detections and continue to develop advanced attacking tools. This attack also used the Trickbot malware in its exploit chain, similar to that used by Ryuk campaigns.
Recommendation: Defense in Depth, including vulnerability remediation and scanning, monitoring, endpoint protection, backups, etc. is key to thwarting increasingly sophisticated attacks. Ransomware attacks are particularly attractive to attackers due to the fact that each successful ransomware attack allows for multiple streams of income. The attackers can not only extort a ransom to decrypt the victim's files (especially in cases where the victim finds they do not have appropriate disaster recovery plans), but they can also monetize the exfiltrated data directly and/or use the data to aid in future attacks. This technique is increasingly used in supply chain compromises to build difficult to detect spearphishing attacks.
Tags: conti, ryuk, ransomware
|
Ransomware
Malware
Tool
Vulnerability
Threat
Conference
|
APT 35
APT 28
APT 31
|
★★★
|
 |
2020-09-14 14:49:08 |
Lock and Code S1Ep15: Safely using Google Chrome Extensions with Pieter Arntz (lien direct) |
This week on Lock and Code, we talk to Pieter Arntz, malware intelligence researcher for Malwarebytes, about Google Chrome extensions.
Categories:
Podcast
Tags: advanced persistent threatsAPTCenter for Public Health ResearchCharming Kittencovid-19data breachddosDDos attackdistributed denial of service attackelection interferenceelectionsLugar CentremalvertisingNetflix scampandemic
(Read more...)
|
Malware
Conference
|
APT 35
|
|
 |
2020-09-09 16:24:00 |
Weekly Threat Briefing: Skimmer, Ransomware, APT Group, and More (lien direct) |
The various threat intelligence stories in this iteration of the Weekly Threat Briefing discuss the following topics: APT, Baka, DDoS, Netwalker, PyVil, Windows Defender, TA413, and Vulnerabilities. The IOCs related to these stories are attached to the Weekly Threat Briefing and can be used to check your logs for potential malicious activity.
Figure 1 - IOC Summary Charts. These charts summarize the IOCs attached to this magazine and provide a glimpse of the threats discussed.
Trending Cyber News and Threat Intelligence
‘Baka’ Javascript Skimmer Identified
(published: September 6, 2020)
Visa have issued a security alert based on identification of a new skimmer, named “Baka”. Based on analysis by Visa Payment Fraud Disruption, the skimmer appears to be more advanced, loading dynamically and using an XOR cipher for obfuscation. The attacks behind Baka are injecting it into checkout pages using a script tag, with the skimming code downloading from the Command and Control (C2) server and executing in memory to steal customer data.
Recommendation: eCommerce site owners must take every step necessary to secure their data and safeguard their payment card information. Visa has also released best practices in the security advisory.
Tags: Baka, Javascript, Skimmer
Netwalker Ransomware Hits Argentinian Government, Demands $4 Million
(published: September 6, 2020)
The Argentinian immigration agency, Dirección Nacional de Migaciones suffered a ransomware attack that shut down border crossings. After receiving many tech support calls, the computer networks were shut down to prevent further spread of the ransomware, which led to a cecission in border crossings until systems were up again. The ransomware used in this attack is Netwalker ransomware, that left a ransom note demanding initalling $2 million, however when this wasn’t paid in the first week, the ransom increased to $4 million.
Recommendation: Ransomware can potentially be blocked by using endpoint protection solutions (HIDS). Always keep your important files backed up following the 3-2-1 rule: have at least 3 different copies, on 2 different mediums, with 1 off-site. In the case of ransomware infection, the affected system must be wiped and reformatted. Other devices on the network should be checked for similar infections. Always check for a decryptor before considering payment; avoid payment at all costs. Ransomware should be reported to law enforcement agencies who are doing their best to track these actors and prevent ransom from being a profitable business for cyber criminals.
MITRE ATT&CK: [MITRE ATT&CK] Data Encrypted for Impact - T1486
Tags: Argentina, Government, Netwalker, Ransomware
No Rest for the Wicked: Evilnum Unleashes PyVil RAT
(published: September 3, 2020)
Researchers on the Cybereason Nocturnus team have published their research tracking the threat actor group known as Evilnum, and an ongoing change in their tooling and attack procedures. This includes a new Remote Access Trojan (RAT), written in python that they have begun to use. The actor group attacks targets in the financial services sector using highly targeted spearphishing. The phishing lures leverage "Know Your Customer" (KY |
Ransomware
Malware
Tool
Vulnerability
Threat
Medical
|
APT 38
APT 28
|
★★★★
|
 |
2020-09-02 12:00:00 |
Your Beloved Blue Jeans Are Polluting the Ocean-Big Time (lien direct) |
When you wash denim, tiny fibers shed and flow into the environment. Scientists just found that Arctic waters are now loaded with little bits of jeans. |
|
APT 32
|
|
 |
2020-09-01 11:00:00 |
Can a Bubble Net Stop a Hurricane? Some Norwegians Think So (lien direct) |
An idea to use underwater bubbles to cool oceans and deflate oncoming storms is the latest in a series of far-out schemes for controlling the weather. |
|
APT 32
|
|
 |
2020-08-28 15:33:29 |
Iran-linked Charming Kitten APT contacts targets via WhatsApp, LinkedIn (lien direct) |
The Iran-linked Charming Kitten APT group leveraged on WhatsApp and LinkedIn to carry out phishing attacks, researchers warn. Clearsky security researchers revealed that Iran-linked Charming Kitten APT group is using WhatsApp and LinkedIn to conduct spear-phishing attacks. Iran-linked Charming Kitten group, (aka APT35, Phosphorus, Newscaster, and Ajax Security Team) made the headlines in 2014 when experts at iSight issued a report describing the most elaborate net-based spying […]
|
Conference
|
APT 35
|
|
 |
2020-08-28 03:36:28 |
Iranian Hackers Pose as Journalists to Trick Victims Into Installing Malware (lien direct) |
An Iranian cyberespionage group known for targeting government, defense technology, military, and diplomacy sectors is now impersonating journalists to approach targets via LinkedIn and WhatsApp and infect their devices with malware.
Detailing the new tactics of the "Charming Kitten" APT group, Israeli firm Clearsky said, "starting July 2020, we have identified a new TTP of the group, |
Malware
Conference
|
APT 35
|
|
 |
2020-08-26 18:30:00 |
\'Transparent Tribe\' APT Group Deploys New Android Spyware for Cyber Espionage (lien direct) |
The group, which has been around since at least 2013, has impacted thousands of organizations, mostly in India. |
|
APT 36
|
|
 |
2020-08-26 10:00:44 |
Transparent Tribe: Evolution analysis,part 2 (lien direct) |
In the second article, we describe a new Android implant used by Transparent Tribe for spying on mobile devices and present new evidence confirms a link between ObliqueRAT and Transparent Tribe. |
|
APT 36
|
|
 |
2020-08-26 06:43:13 |
Lazarus APT targets cryptocurrency organizations with using LinkedIn lures (lien direct) |
North Korea-linked Lazarus APT group targets cryptocurrency organizations with fake job offers in an ongoing spear-phishing campaign. North Korea-linked Lazarus APT group (aka HIDDEN COBRA) has been observed while using LinkedIn lures in a spear-phishing campaign targeting the cryptocurrency organizations worldwide, including in the United States, the United Kingdom, Germany, Singapore, the Netherlands, Japan. The activity of […]
|
Medical
|
APT 38
|
|
 |
2020-08-25 09:00:00 |
Lazarus group strikes cryptocurrency firm through LinkedIn job adverts (lien direct) |
A system administrator proved to be the weak link, opening the door for Lazarus to attack. |
|
APT 38
|
|
 |
2020-08-24 06:51:36 |
Transparent Tribe APT hit 1000+ victims in 27 countries in the last 12 months (lien direct) |
The Transparent Tribe cyber-espionage group continues to improve its arsenal while targets Military and Government entities. The Transparent Tribe APT group is carrying out an ongoing cyberespionage campaign aimed at military and diplomatic targets worldwide. The group upgraded its Crimson RAT by adding a management console and implementing a USB worming capability that allows it […]
|
|
APT 36
|
|
 |
2020-08-20 12:03:21 |
Transparent Tribe APT targets government, military by infecting USB devices (lien direct) |
The hacking group is focused on campaigns in India and Afghanistan. |
|
APT 36
|
|
 |
2020-08-20 10:00:13 |
Transparent Tribe: Evolution analysis, part 1 (lien direct) |
Transparent Tribe, also known as PROJECTM and MYTHIC LEOPARD, is a highly prolific group whose activities can be traced as far back as 2013. |
|
APT 36
|
|
 |
2020-08-18 17:46:29 |
Wait, How Much Microplastic Is Swirling in the Atlantic? (lien direct) |
Scientists calculate that the top 200 meters of ocean alone contains up to 21 million metric tons of plastic. And that wasn't even counting microfibers. |
|
APT 32
|
|
 |
2020-08-18 04:35:04 |
US Army report says many North Korean hackers operate from abroad (lien direct) |
US Army says many North Korean hackers are actually located outside the hermit kingdom, in countries like Belarus, China, India, Malaysia, and Russia. |
Cloud
|
APT 37
|
|
 |
2020-08-14 17:39:50 |
(Déjà vu) North Korea\'s Lazarus compromised dozens of organizations in Israel (lien direct) |
Since January 2020, the North Korea-linked Lazarus APT has successfully compromised dozens of organizations in Israel and other countries. The Israeli defence ministry announced on Wednesday that it had foiled a cyber attack carried out by a foreign threat actor targeting the country's defence manufacturers. According to the officials, the attack was launched by “an […]
|
Threat
|
APT 38
|
|
 |
2020-08-10 14:30:04 |
Black Hat 2020: Fixing voting – boiling the ocean? (lien direct) |
With the big voting day rapidly approaching, can the security of the election still be shored up? If so, how?
|
|
APT 32
|
|
 |
2020-08-04 16:20:12 |
Iranian hacker group becomes first known APT to weaponize DNS-over-HTTPS (DoH) (lien direct) |
Kaspersky says Oilrig (APT34) group has been using DoH to silently exfiltrate data from hacked networks. |
|
APT 34
|
|
 |
2020-07-29 06:42:42 |
North Korea-Linked Lazarus APT is behind the VHD ransomware (lien direct) |
Security experts from Kaspersky Lab reported that North Korea-linked hackers are attempting to spread a new ransomware strain known as VHD. North Korean-linked Lazarus APT Group continues to be very active, the state-sponsored hackers are actively employing new ransomware, tracked as VHD, in attacks aimed at enterprises. The activity of the Lazarus Group surged in 2014 and […]
|
Ransomware
|
APT 38
|
|
 |
2020-07-28 12:15:00 |
North Korean hackers created VHD ransomware for enterprise attacks (lien direct) |
North Korean-backed hackers tracked as the Lazarus Group have developed and are actively using VHD ransomware against enterprise targets according to a report published by Kaspersky researchers today. [...] |
Ransomware
Medical
|
APT 38
|
|
 |
2020-07-28 10:00:27 |
Lazarus on the hunt for big game (lien direct) |
By investigating a number of targeted ransomware attacks and through discussions with some of our trusted industry partners, we feel that we now have a good grasp on how the ransomware ecosystem is structured. |
Ransomware
|
APT 38
|
|
 |
2020-07-24 13:00:18 |
Check Point CloudGuard Connect Protects Microsoft Azure Branch Office Internet Connections from Cyber Attacks (lien direct) |
By Russ Schafer, Head of Product Marketing, Security Platforms Enterprises are moving their applications, workloads and services out of the data center into the cloud. As enterprises become more distributed, organizations need flexible solutions that deliver secure and predictable application performance across a global footprint. Companies need to securely connect their branch offices to the…
|
Prediction
|
APT 39
|
|
 |
2020-07-23 14:46:05 |
New MATA Multi-platform malware framework linked to NK Lazarus APT (lien direct) |
North Korea-linked Lazarus APT Group has used a new multi-platform malware framework, dubbed MATA, to target entities worldwide The notorious Lazarus Group is using a new multi-platform malware framework, dubbed MATA, in attacks aimed at organizations worldwide, to deploy Kaspersky researchers observed that MATA was used by the threat actors to distribute ransomware (i.e. VHD […]
|
Ransomware
Malware
Threat
Medical
|
APT 38
|
|
 |
2020-07-23 02:18:46 |
North Korean Hackers Spotted Using New Multi-Platform Malware Framework (lien direct) |
Lazarus Group, the notorious hacking group with ties to the North Korean regime, has unleashed a new multi-platform malware framework with an aim to infiltrate corporate entities around the world, steal customer databases, and distribute ransomware.
Capable of targeting Windows, Linux, and macOS operating systems, the MATA malware framework - so-called because of the authors' reference to the |
Malware
Medical
|
APT 38
|
|
 |
2020-07-22 15:55:00 |
North Korea\'s Lazarus Group Developing Cross-Platform Malware Framework (lien direct) |
The APT group, known for its attack on Sony Pictures in 2014, has created an "advanced malware framework" that can launch and manage attacks against systems running Windows, MacOS, and Linux. |
Malware
|
APT 38
|
|
 |
2020-07-22 14:49:59 |
Lazarus hackers deploy ransomware, steal data using MATA malware (lien direct) |
A recently discovered malware framework known as MATA and linked to the North Korean-backed hacking group known as Lazarus was used in attacks targeting corporate entities from multiple countries since April 2018 for ransomware deployment and data theft. [...] |
Ransomware
Malware
|
APT 38
|
|
 |
2020-07-17 13:49:25 |
Iran-linked APT35 accidentally exposed 40 GB associated with their operations (lien direct) |
Iran-linked APT35 group accidentally exposed one of its servers, leaving online roughly 40 GB of videos and other files associated with its operations. Researchers at IBM X-Force Incident Response Intelligence Services (IRIS) discovered an unsecured server belonging to Iran-linked APT35 group (aka ITG18, Charming Kitten, Phosphorous, and NewsBeef) containing data for many domains managed by […]
|
Conference
|
APT 35
|
|
 |
2020-07-17 10:00:58 |
Check Point IoT Protect Uses Automation and Threat Intelligence to Prevent the most advanced IoT cyber-attacks (lien direct) |
Integrated solution prevents attacks at both IoT network and device level, even on unpatchable devices: protects critical infrastructure, industrial, healthcare, smart city and smart building environments By Russ Schafer, Head of Product Marketing, Security Platforms It is estimated that over 41 billion IoT devices will be connected in the next few years. Given 127 new…
|
Threat
Prediction
|
APT 39
|
|
 |
2020-07-17 03:23:46 |
Iranian Hackers Accidentally Exposed Their Training Videos (40 GB) Online (lien direct) |
An OPSEC error by an Iranian threat actor has laid bare the inner workings of the hacking group by providing a rare insight into the "behind-the-scenes look into their methods."
IBM's X-Force Incident Response Intelligence Services (IRIS) got hold of nearly five hours worth of video recordings of the state-sponsored group it calls ITG18 (also called Charming Kitten, Phosphorous, or APT35) that |
Threat
Conference
|
APT 35
|
★★★★★
|
 |
2020-07-16 10:00:00 |
Iranian Spies Accidentally Leaked a Video of Themselves Hacking (lien direct) |
IBM's X-Force security team obtained five hours of APT35 hacking operations, showing exactly how the group breaks into email accounts-and who it's targeting. |
Conference
|
APT 35
|
|
 |
2020-07-16 09:00:00 |
New Research Exposes Iranian Threat Group\'s Operations (lien direct) |
IBM X-Force Incident Response Intelligence Services (IRIS) has uncovered rare details on the operations of the suspected Iranian threat group ITG18, which overlaps with Charming Kitten and Phosphorous. In the past few weeks, ITG18 has been associated with targeting of pharmaceutical companies and the U.S. presidential campaigns. Now, due to operational errors-a basic misconfiguration-by suspected […]
|
Threat
Conference
|
APT 35
|
|
 |
2020-07-16 05:43:03 |
CIA covert operations likely behind attacks against APT34 and FSB (lien direct) |
CIA orchestrated dozens of hacking operations against targets worldwide, including APT34 and FSB hacks, states an exclusive report from Yahoo News. In 2018, US President Trump gave to the Central Intelligence Agency (CIA) more powers to conduct covert offensive cyber operations against hostile threat actors, including Iranian and Russian APT groups and intelligence agencies. In […]
|
Threat
|
Yahoo
APT 34
|
|
 |
2020-07-15 13:07:00 |
(Déjà vu) Report: CIA most likely behind APT34 and FSB hacks and data dumps (lien direct) |
In 2018, US President Trump gave the CIA more powers to carry out covert cyber operations resulting in several hacks and data dumps from Iranian and Russian spy agencies. |
|
APT 34
|
|