Remove 2009 Remove Analysis Remove Libraries
article thumbnail

The analysis of the code reuse revealed many links between North Korea malware

Security Affairs

The experts focused their analysis on the code reuse, past investigations revealed that some APT groups share portions of code and command and control infrastructure for their malware. In defining similarities, we take into account only unique code connections, and disregard common code or libraries. ” states the report.

article thumbnail

Devices from Dell, HP, and Lenovo used outdated OpenSSL versions

Security Affairs

Researchers discovered that devices from Dell, HP, and Lenovo are still using outdated versions of the OpenSSL cryptographic library. Binarly researchers discovered that devices from Dell, HP, and Lenovo are still using outdated versions of the OpenSSL cryptographic library. that dates back to 2009. . that dates back to 2009.

Libraries 100
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Homomorphic Encryption Makes Real-World Gains, Pushed by Google, IBM, Microsoft

eSecurity Planet

To counter this, some major IT vendors are pushing forward with a decades-old encryption idea that was first talked about in the late 1970s but not successfully demonstrated for the first time until 2009. Since then, interest in fully homomorphic encryption (FHE) has increased, largely paralleling the rise of cloud computing.

article thumbnail

North Korea-linked Lazarus APT uses a Mac variant of the Dacls RAT

Security Affairs

This threat actor has been active since at least 2009, possibly as early as 2007, and it was involved in both cyber espionage campaigns and sabotage activities aimed to destroy data and disrupt systems. ” reads the analysis published by the researchers. This library has been used by several threat actors.”

article thumbnail

Mysterious DarkUniverse APT remained undetected for 8 years

Security Affairs

The analysis of the script revealed the existence of a mysterious APT group tracked by Kaspersky Lab as ‘ DarkUniverse ’. The DarkUniverse has been active at least from 2009 until 2017. The executable file embedded in the documents drops two dynamic-link libraries on the target system, the updater. mod and glue30.dll.

article thumbnail

APT10 is back with two new loaders and new versions of known payloads

Security Affairs

The group has been active at least since 2009, in April 2017 experts from PwC UK and BAE Systems uncovered a widespread hacking campaign, tracked as Operation Cloud Hopper , targeting managed service providers (MSPs) in multiple countries worldwide. ” reads the analysis published by enSilo. ” concludes the experts.

article thumbnail

Latest Turla backdoor leverages email PDF attachments as C&C mechanism

Security Affairs

Malware researchers from ESET have conducted a new analysis of a backdoor used by the Russia-linked APT Turla in targeted espionage operations. The new analysis revealed a list of high-profile victims that was previously unknown. ” reads the analysis published by ESET. ” reads the analysis published by ESET.