Src |
Date (GMT) |
Titre |
Description |
Tags |
Stories |
Notes |
|
2020-08-20 12:03:21 |
Transparent Tribe APT targets government, military by infecting USB devices (lien direct) |
The hacking group is focused on campaigns in India and Afghanistan. |
|
APT 36
|
|
|
2020-08-20 10:00:13 |
Transparent Tribe: Evolution analysis, part 1 (lien direct) |
Transparent Tribe, also known as PROJECTM and MYTHIC LEOPARD, is a highly prolific group whose activities can be traced as far back as 2013. |
|
APT 36
|
|
|
2020-03-23 16:44:58 |
A week in security (March 16 – 22) (lien direct) |
A roundup of the previous week's most notable security stories and events, including COVID-19-themed threats, child identity theft, and securely working from home.
Categories:
A week in security
Tags: APT36awiscovid-19emotetfake newsmoney muleMonitorMinorphishing scamromance scamshadow IoTSlackstalkerwaretrickbotweek in securityweekly blog roundupWHOWorld Health Organization
(Read more...)
|
|
APT 36
|
|
|
2020-03-18 10:48:32 |
(Déjà vu) Crimson RAT spread via Coronavirus Phishing (lien direct) |
A state-sponsored threat actor is attempting to deploy the Crimson Remote Administration Tool (RAT) onto the systems of targets via a spear-phishing campaign using Coronavirus-themed document baits disguised as health advisories. This nation-backed cyber-espionage is suspected to be Pakistan-based and it is currently tracked under multiple names including APT36, Transparent Tribe, ProjectM, Mythic Leopard, and […]
|
Tool
Threat
|
APT 36
|
★★
|
|
2020-03-16 15:00:00 |
APT36 jumps on the coronavirus bandwagon, delivers Crimson RAT (lien direct) |
We look at a spear phishing attack from APT36, an Advanced Persistent Threat group posing as the government of India and offering guidance on coronavirus. Instead, users are infected with a Crimson RAT that steals data.
Categories:
Threat analysis
Tags: APTAPT36coronaviruscoronavirus malwarecovid-19credential stealercrimson ratexploitexploitsinfo-stealermacromalicious macromalwarenation-state attackratremote administration toolSocial Engineeringspear phishingspear phishing attacktransparent tribe
(Read more...)
|
Threat
|
APT 36
|
|
|
2020-03-03 18:48:42 |
The North Korean Kimsuky APT threatens South Korea evolving its TTPs (lien direct) |
Cybaze-Yoroi ZLab analyzed a new implant employed by a North Korea-linked APT group, tracked as Kimsuky, in attacks on South Korea. Introduction Recently we have observed a significant increase in state-sponsored operations carried out by threat actors worldwide. APT34, Gamaredon, and Transparent Tribe are a few samples of the recently uncovered campaigns, the latter was spotted after four […]
|
Threat
|
APT 34
APT 36
|
|
|
2020-02-21 13:48:11 |
Exclusive: Pakistan and India to armaments: Operation Transparent Tribe is back 4 years later (lien direct) |
Exclusive: Pakistan and India to armaments. Researchers from Cybaze-Yoroi ZLab gathered intelligence on the return of Operation Transparent Tribe is back 4 years later Introduction The Operation Transparent Tribe was first spotted by Proofpoint Researchers in Feb 2016, in a series of espionages operations against Indian diplomats and military personnel in some embassies in Saudi Arabia and Kazakhstan. […]
|
|
APT 36
|
|
|
2018-07-06 15:00:00 |
Can we trust our online project management tools? (lien direct) |
Online project management tools can be not only useful, but a lifeline for developers and PMs who juggle multiple tasks with competing deadlines. How can we use them in a secure way?
Categories:
Business
Security world
Tags: breachcloudmanagementonline project managementPieter ArntzPMssecurity
(Read more...)
|
|
APT 36
|
|
|
2016-04-18 14:07:50 |
“Operation C-Major” Actors Also Used Android, BlackBerry Mobile Spyware Against Targets (lien direct) |
Last March, we reported on Operation C-Major, an active information theft campaign that was able to steal sensitive information from high profile targets in India. The campaign was able to steal large amounts of data despite using relatively simple malware because it used clever social engineering tactics against its targets. In this post, we will focus on the mobile part of their operation and discuss in detail several Android and BlackBerry apps they are using. Based on our investigation, the actors behind Operation C-Major were able to keep their Android malware on Google Play for months and they advertised their apps on Facebook pages which have thousands of likes from high profile targets.Post from: Trendlabs Security Intelligence Blog - by Trend Micro“Operation C-Major” Actors Also Used Android, BlackBerry Mobile Spyware Against Targets |
|
APT 36
|
|