What's new arround internet

Last one

Src Date (GMT) Titre Description Tags Stories Notes
DarkReading.webp 2016-09-14 21:05:00 Olympic Athletes\' Medical Data Compromised By Russian Hackers (lien direct) Sensitive details of Rio Olympic Games athletes compromised and released publicly by Fancy Bear, World Anti-Doping Agency says. APT 28
ESET.webp 2016-09-14 17:17:36 WADA cyberattack compromises agency\'s database (lien direct) The World Anti-Doping Agency (WADA) has revealed that it was the victim of a cyberattack, which it has attributed to the Russian cyber espionage group, Tsar Team (APT28). APT 28
The_State_of_Security.webp 2016-09-14 10:46:22 Confirmed! Russian Hackers Accessed U.S. Athletes\' Doping Records (lien direct) Authorities confirmed that Russian hackers accessed a database containing the medical data of U.S. athletes who participated in the Rio 2016 Olympics. On 13 September, the World Anti-Doping Agency (WADA) said in a statement that a Russian cyber-espionage group known as APT28 or “Fancy Bear” gained access to its Anti-Doping Administration and Management System (ADAMS) […]… Read More APT 28
NetworkWorld.webp 2016-09-14 07:16:00 Russian hackers accused of leaking US Olympic athletes\' medical files (lien direct) The World Anti-Doping Agency (WADA) was hacked and confidential medical files of US Olympic athletes Simone Biles, Serena and Venus Williams and Elena Delle Donne were leaked online. The hackers dubbed the dump as “just the tip of the iceberg.”A group claiming to be the Fancy Bears' Hack Team took credit for the attack and accused American Olympic athletes of doping, of using “dirty methods to win.” Furthermore, the hackers claimed that although the US Olympic team had "played well but not fair,” it had “disgraced its name by tainted victories.”To read this article in full or to leave a comment, please click here APT 28
Pirate.webp 2016-09-14 07:03:11 APT28 / Fancy Bear – Quand les pirates russes s\'attaquent aux athlètes olympiques (lien direct) rio-de-janeiro-jo-2016Après le piratage et l'énorme fuite de donnée personnelles ciblant les athlètes ayant eu lieu pendant les JO 2016 de Rio, les hackers professionnels russes sont pointé du doigt comme responsables par l'agence mondiale antidopage. APT 28
SC_Mag.webp 2016-09-13 21:23:22 WADA confirms Fancy Bear behind attack on anti-doping database (lien direct) The Russian espionage group Tsar Team, aka Fancy Bear, got into the ADAMS system through an account created by the International Olympic Committee for the 2016 Rio Games. APT 28
NetworkWorld.webp 2016-09-13 17:09:52 Hackers smear Olympic athletes with data dump of medical files (lien direct) Hackers are trying to tarnish the U.S. Olympic team by releasing documents they claim show athletes including gymnast Simone Biles and tennis players Venus and Serena Williams used illegal substances during the Rio Games.The medical files, allegedly from the World Anti-Doping Agency, were posted Tuesday on a site bearing the name of the hacking group Fancy Bears. “Today we'd like to tell you about the U.S. Olympic team and their dirty methods to win,” said a message on the hackers' site.The World Anti-Doping Agency confirmed it had been hacked and blamed Fancy Bears, a Russian state-sponsored cyber espionage team that is also known as APT 28 -- the very same group that may have recently breached the Democratic National Committee.To read this article in full or to leave a comment, please click here APT 28
CSO.webp 2016-09-13 14:27:00 Russian spies blamed for WADA hack, leaked documents confirm drug exemptions (lien direct) On Tuesday, a group calling itself Fancy Bear, and claiming association with Anonymous, said they've hacked the World Anti-Doping Agency, and offered drug screening results as proof. Only, the leaked documents don't contain incriminating facts. If anything, they show athletes following the rules as expected.The thing about Anonymous is that anyone can claim to be associated with the brand. These days, Anonymous is nothing like it was during its prime (e.g. 2008-2012), but that doesn't stop people from resonating with their ideals and launching operations associated with the Anonymous name and symbolism.On Tuesday, during the announcement of OpOlympics, a group claiming association with Anonymous and calling themselves Fancy Bears' international hack team, claimed credit for hacking World Anti-Doping Agency (WADA).To read this article in full or to leave a comment, please click here APT 28
NetworkWorld.webp 2016-09-13 13:54:46 Russian hackers allegedly target the World Anti-Doping Agency (lien direct) The same Russian state-sponsored hackers that allegedly breached the Democratic National Committee may have also targeted the World Anti-Doping Agency.On Tuesday, the sports drug-testing agency blamed a recent breach of its network on a Russian hacking group known as APT 28 or Fancy Bear.The hackers gained access to the agency's database and stole information about  athletes including confidential medical data. Some of that data has already been publicly released, and the hackers have threatened to release more, the agency said in a statement.To read this article in full or to leave a comment, please click here APT 28
SecurityWeek.webp 2016-08-24 11:54:24 Attack on Olympics Anti-Doping Agency Linked to Russia (lien direct) Recent cyberattacks targeting the World Anti-Doping Agency (WADA) have been linked by researchers to the notorious Russian threat actor known as Fancy Bear. APT 28
SC_Mag.webp 2016-08-23 19:00:00 Olympic drug testing agency cyber attacks linked to DNC and DCCC hackers (lien direct) Researchers believe Fancy Bear hacked the Olympic drug-testing agency in retaliation for WADA's recommendation to ban all Russian athletes from the Olympics. APT 28
SC_Mag.webp 2016-08-02 12:56:24 ThreatConnect, Fidelis tie Fancy Bear to DCCC hack (lien direct) New research on the Democratic Congressional Campaign Committee (DCCC) breach was likely the work of the Fancy Bear APT group, the same Russian intelligence-linked hackers responsible for intrusions at the DNC. APT 28
ArsTechnica.webp 2016-08-01 20:50:45 DNC Staffer got pop-up messages alerting of “state-sponsored actors” (lien direct) Attack on congressional campaign committee tied to "Fancy Bear" hack of DNC. APT 28
SC_Mag.webp 2016-06-21 13:04:21 Guccifer 2.0 out - Cozy Bear, Fancy Bear hacked DNC, Fidelis analysis shows (lien direct) A comparative analysis by Fidelis Cybersecurity of malware samples provided by the DNC supported findings by CrowdStrike that a pair of intrusions were the handiwork of the Cozy Bear and Fancy Bear APT groups purported to have ties to Russian intelligence. APT 29 APT 28
Trend.webp 2016-05-13 18:00:02 New Flash Vulnerability CVE-2016-4117 Shares Similarities With Older Pawn Storm Exploit (lien direct) Earlier this week Adobe released a security advisory (APSA16-02) which disclosed that a critical vulnerability (CVE-2016-4117) was present in versions of Adobe Flash Player. Reports also said it was being exploited in the wild. A successful exploit could cause the targeted system to crash and potentially allow arbitrary code to run on the system, allowing an attacker to take control of it. Note that Adobe has released the patch on May 12.We would like to dive into the detail this vulnerability to provide additional background information about this threat.Post from: Trendlabs Security Intelligence Blog - by Trend MicroNew Flash Vulnerability CVE-2016-4117 Shares Similarities With Older Pawn Storm Exploit APT 28
Trend.webp 2016-05-11 15:21:31 Pawn Storm Targets German Christian Democratic Union (lien direct) April last year, Pawn Storm reportedly compromised computers of the German Bundestag using data-stealing malware. This was the first documented political attack of Pawn Storm against Germany. One year later, this espionage actor group takes a swing once again.In April 2016, we discovered that Pawn Storm started a new attack against the German Christian Democratic Union (CDU), the political party of the Chancellor of Germany, Angela Merkel.The attack consisted of seemingly coordinated credential phishing attacks against the CDU and high profile users of two German freemail providers. A fake corporate webmail server of CDU was set up in Latvia for advanced credential phishing. Around the same time, 3 domains were created for credential phishing targeting high-profile individual users of two German free webmail providers. The main fake webmail server of CDU was set up in Latvia, but the free webmail credential phishing sites are on servers of the Virtual Private Server provider in the Netherlands we have discussed previously.Post from: Trendlabs Security Intelligence Blog - by Trend MicroPawn Storm Targets German Christian Democratic Union APT 28
Trend.webp 2016-04-21 10:23:44 Looking Into a Cyber-Attack Facilitator in the Netherlands (lien direct) A small webhosting provider with servers in the Netherlands and Romania has been a hotbed of targeted attacks and advanced persistent threats (APT) since early 2015. Starting from May 2015 till today we counted over 100 serious APT incidents that originated from servers of this small provider. Pawn Storm used the servers for at least 80 high profile attacks against various governments in the US, Europe, Asia, and the Middle East. Formally the Virtual Private Server (VPS) hosting company is registered in Dubai, United Arab Emirates (UAE). But from public postings on the Internet, it is apparent that the owner doesn't really care about laws in UAE. In fact, Pawn Storm and another APT group, attacked the government of UAE using servers of the VPS provider through highly targeted credential phishing. Other threat actors like DustySky (also known as the Gaza hackers) are also regularly using the VPS provider to host their Command and Control (C&C) servers and to send spear phishing e-mails.Post from: Trendlabs Security Intelligence Blog - by Trend MicroLooking Into a Cyber-Attack Facilitator in the Netherlands APT 28
Mandiant.webp 2015-04-18 11:10:00 Opération Russiandoll: Adobe & Windows Exploits zéro-day Probablement exploités par APT28 de Russie dans une attaque très ciblée
Operation RussianDoll: Adobe & Windows Zero-Day Exploits Likely Leveraged by Russia\\'s APT28 in Highly-Targeted Attack
(lien direct)
Fireeye Labs a récemment détecté une campagne APT limitée exploitant les vulnérabilités zéro-jours dans Adobe Flash et une toute nouvelle à Microsoft Windows.En utilisant le Dynamic Keen Intelligence Cloud (DTI) , les chercheurs de Fireeye ont détecté un modèle d'attaques commençant le 13 avril Th , 2015. Adobe a indépendamment corrigé la vulnérabilité (CVE-2015-3043) dans APSB15-06 .Grâce à la corrélation des indicateurs techniques et des infrastructures de commandement et de contrôle, FireEye évalue que l'APT28 est probablement responsable de cette activité. Microsoft est conscient de la vulnérabilité d'escalade locale exceptionnelle dans Windows
FireEye Labs recently detected a limited APT campaign exploiting zero-day vulnerabilities in Adobe Flash and a brand-new one in Microsoft Windows. Using the Dynamic Threat Intelligence Cloud (DTI), FireEye researchers detected a pattern of attacks beginning on April 13th, 2015. Adobe independently patched the vulnerability (CVE-2015-3043) in APSB15-06. Through correlation of technical indicators and command and control infrastructure, FireEye assess that APT28 is probably responsible for this activity. Microsoft is aware of the outstanding local privilege escalation vulnerability in Windows
Vulnerability Threat Cloud APT 28 APT 28 ★★★★
Mandiant.webp 2014-10-27 03:00:42 Malware APT28: une fenêtre sur les opérations de cyber-espionnage de la Russie?
APT28 Malware: A Window into Russia\\'s Cyber Espionage Operations?
(lien direct)
Le rôle des acteurs de l'État-nation dans les cyberattaques a peut-être été le plus largement révélé en février 2013 lorsque mandiant href = "https://www.mandiant.com/resources/mandiant-expose-apt1-chinas-cyber-espionage-units" cible = "_ Blank"> Rapport APT1, en Chine.Aujourd'hui, nous publions un nouveau rapport: apt28:Une fenêtre sur les opérations de cyber-espionnage de la Russie? Ce rapport se concentre sur un groupe de menaces que nous avons désigné comme APT28.Alors que les logiciels malveillants d'APT28 \\ sont assez connus dans la communauté de la cybersécurité, notre rapport détaille des informations supplémentaires exposant des opérations en cours et ciblées qui, selon nous, indiquent un sponsor gouvernemental basé à Moscou. dans
The role of nation-state actors in cyber attacks was perhaps most widely revealed in February 2013 when Mandiant released the APT1 report, which detailed a professional cyber espionage group based in China. Today we release a new report: APT28: A Window Into Russia\'s Cyber Espionage Operations? This report focuses on a threat group that we have designated as APT28. While APT28\'s malware is fairly well known in the cybersecurity community, our report details additional information exposing ongoing, focused operations that we believe indicate a government sponsor based in Moscow. In
Malware Threat APT 28 APT 28 APT 1 ★★★★
Last update at: 2024-05-10 04:07:54
See our sources.
My email:

To see everything: Our RSS (filtrered) Twitter