Remove 2009 Remove Encryption Remove Military
article thumbnail

Platinum APT and leverages steganography to hide C2 communications

Security Affairs

According to Microsoft, the Platinum has been active since at least 2009, it was responsible for spear phishing attacks on ISPs, government organizations, intelligence agencies, and defense institutes. The analysis of the encrypted files used in the second stage revealed a previously undiscovered backdoor associated with the Platinum group.

article thumbnail

Encryption: How It Works, Types, and the Quantum Future

eSecurity Planet

Encryption and the development of cryptography have been a cornerstone of IT security for decades and remain critical for data protection against evolving threats. While cryptology is thousands of years old, modern cryptography took off in the 1970s with the help of the Diffie-Hellman-Merkle and RSA encryption algorithms.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Platinum APT group adds the Titanium backdoor to its arsenal

Security Affairs

According to Microsoft, the Platinum has been active since at least 2009, it was responsible for spear phishing attacks on ISPs, government organizations, intelligence agencies, and defense institutes. “ BITS Downloader – This component is used to download encrypted files from the C&C server then decrypt and launch them.”

IT 180
article thumbnail

Latest Turla backdoor leverages email PDF attachments as C&C mechanism

Security Affairs

. “These organizations are the latest known additions to the list of victims of this APT group that has been targeting governments, state officials, diplomats, and military authorities since at least 2008.” ” The Turla backdoor has been used since at least 2009 and was continuously improved across the years.

Metadata 175
article thumbnail

New European Union Dual-Use Regulation Enters Into Force

Data Matters

As from September 9, 2021, Regulation (EU) 2021/821 ( EU Dual-Use Regulation Recast ) replaces the existing Council Regulation (EC) 428/2009 setting up the European Union (EU) regime for the control of exports, transfer, brokering, and transit of “dual-use” items ( EU Dual-Use Regulation ). New controls on technical assistance.

article thumbnail

Weekly podcast: 2018 end-of-year roundup

IT Governance

In August, Yale University announced that it had discovered a log revealing a ten-year-old data breach on its systems , in which personal information relating to people affiliated with the university before February 2009 was compromised. Information including their names, email addresses, and encrypted passwords may have been compromised.

article thumbnail

MY TAKE: How state-backed cyber ops have placed the world in a constant-state ‘Cyber Pearl Harbor’

The Last Watchdog

That May 10th air strike by the Israel Defense Force marked the first use of military force in direct retaliation for cyber spying. This comes as no surprise to anyone in the military or intelligence communities. nuclear arsenal in 2003 • Breaches of computers at the Department of Commerce in 2006 • Hacking of military systems at U.S.

IoT 171