This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
ZLab researchers spotted a new malicious espionage activity targeting Italian companies operating worldwide in the manufacturing sector. This actor was first spotted by PaloAlto’s UNIT42 in 2018 during wide scale operations against technology, retail, manufacturing, and local government industries in the US, Europe and Asia.
Researchers discovered a new info stealer dubbed SYS01 stealer targeting critical government infrastructure and manufacturing firms. ” reads the analysis published by Morphisec. ” reads the analysis published by Morphisec. to lure victims into downloading a malicious file.
In the most recent campaign, the group targeted organizations in the communications, manufacturing, utility, transportation, construction, maritime, government, information technology, and education sectors. government neutralized the Volt Typhoon botnet taking over its C2 and deleting the bot from infected devices.
China-linked Curious Gorge APT is targeting Russian government agencies, Google Threat Analysis Group (TAG) warns. Google Threat Analysis Group (TAG) reported that an APT group linked to China’s People’s Liberation Army Strategic Support Force (PLA SSF), tracked as Curious Gorge , is targeting Russian government agencies.
FritzFrog P2P botnet is back and is targeting servers belonging to entities in the healthcare, education, and government sectors. The bot is written in Golang and implements wormable capabilities, experts reported attacks against entities in the government, education, and finance sectors. ” reads the report published by Akamai.
A new threat actor tracked as TA2101 is conducting malware campaigns using email to impersonate government agencies in the United States, Germany, and Italy. ” reads the analysis published by ProofPoint. The post New TA2101 threat actor poses as government agencies to distribute malware appeared first on Security Affairs.
The Raspberry Robin worm attacks aimed at telecommunications and government office systems across Latin America, Australia, and Europe. Researchers from Trend Micro have uncovered a Raspberry Robin worm campaign targeting telecommunications and government office systems across Latin America, Australia, and Europe. Pierluigi Paganini.
After looking at 28 of the most popular manufacturers, our research team found 3.5 What is more, the overwhelming majority of internet-facing cameras are manufactured by Chinese companies. Most of the public-facing cameras we discovered are manufactured by the Chinese company Hikvision: the Cybernews research team found over 3.37
The list of victims includes manufacturing organizations, banks, schools, and event and meeting planning companies. The analysis of the attackers’ wallet transactions shows that they failed to extort ransom payments from their victims. The first possibility is that the North Korean government sponsors this activity.”
Threat actors employed the previously-undetected PoetRAT Trojan in a Coronavirus-themed campaign aimed at government and energy sectors. . ” reads the analysis published by Cisco Talos. ” reads the analysis published by Cisco Talos. ” continues the analysis. The messages used a document named “C19.docx,”
” states the analysis published by FireEye. “For example, UNC2529 used a unique username, masquerading as an account executive for a small California-based electronics manufacturing company, which Mandiant identified through a simple Internet search.”
Hackers are targeting executives of a German multinational corporation involved in the government supply of personal protective equipment (PPE) against COVID-19. Hackers are targeting executives of a German multinational corporation involved in the government supply of personal protective equipment (PPE).
The Company offers risk management, mutual funds, analysis, financial planning, and advisory services. Avaddon ransomware gang made the headlines again, the cybercrime gang has breached the France-based financial consultancy firm Acer Finance. Acer Finance operates as an investment management company.
” Threat actors employed anti-analysis and evasion techniques, including, code obfuscation and performing some checks for sandbox or debugger environments. At the time of the analysis, the hard-coded target URL of the malware was not reachable making it impossible to attribute the Kraken technique to a specific threat actor.
The ransomware gang hit organizations in multiple industries, including the education, healthcare, manufacturing, information technology, and government sectors. The victims of the group are “targets of opportunity.” ” reads the joint advisory. mstsc.exe A native tool that establishes an RDP connection to a host.
The group used the backdoor in attacks against Middle Eastern governments. The APT group has been continuously improving its toolset by employing new malware in attacks aimed at governments, diplomatic missions, charities, and industrial/manufacturing organizations in the Middle East and Africa.
British Prime Minister Boris Johnson is expected to begin phasing out the use of network equipment manufactured by the Chinese tech giant Huawei in the UK’s 5G network as little as six months, The Daily Telegraph reported. The UK intelligence analysis believe that US ban on Chinese 5G technology will force Huawei to use untrusted technology.
French President Emmanuel Macron announced that his government will not exclude Chinese telecom giant Huawei from the building of the upcoming 5G telecommunication networks. The UK intelligence analysis believe that US ban on Chinese 5G technology will force Huawei to use untrusted technology.
The attacks detailed by Cybereason targeted technology and manufacturing companies primarily located in East Asia, Western Europe, and North America. Symantec pointed out that the attacks against government organizations in Hong Kong remained undetected for a year in some cases. ” reads the analysis published by Symantec.
Experts uncovered a new threat actor, tracked as Balikbayan Foxes, that is impersonating the Philippine government to spread malware. . The group focuses on Shipping/Logistics, Manufacturing, Business Services, Pharmaceutical, and Energy entities, among others. ” reads the analysis published by the experts. .
The campaign began in June 2022 and is still ongoing, the attacks hit organizations in multiple industries, such as Automotive, Chemicals Manufacturing, and others. ” reads the post published by Zscaler. ” concludes the report. Follow me on Twitter: @securityaffairs and Facebook. Pierluigi Paganini.
A cyber-espionage group, tracked as APT40, apparently linked to the Chinese government is focused on targeting countries important to the country’s Belt and Road Initiative. Jumper , and Leviathan ), apparently linked to the Chinese government, is focused on targeting countries important to the country’s Belt and Road Initiative (i.e.
” Rosaviatsia is the government agency responsible for the oversight and regulation of civil aviation in Russia. “Their analysis shows that the civil aviation sector of terrorist Russia is on the verge of collapse.” ” continues the announcement. ” concludes the report.
Ethical hackers have contacted device manufacturers after exposing vulnerabilities in their products. A recent example of a medical device problem concerns a pacemaker manufactured by Medtronic. The agency followed up by doing its own analysis. Government Agencies Present at Cybersecurity Conferences. Image by Rawpixel.
Governments should recognize electoral processes as critical infrastructure and enact laws to regulate the use of generative Artificial Intelligence. By broadening the horizon of analysis, it is possible to verify that there will also be elections in China, Japan, Russia, Brazil, and the United Kingdom in the coming months.
The experts observed the use of NineRAT at around September 2023 against a European manufacturing entity. Talos researchers reported some overlap with the malicious activities disclosed by Microsoft in October 2023 linked to the APT group Onyx Sleet (aka PLUTIONIUM or Andariel ). ” reads the analysis published by Talos.
Attackers hit organizations in several industries including Technology, Retail, Manufacturing, State/Local Government, Hospitality, Medical, and other Professional business. ” reads the analysis published by Palo Alto Networks. ” continues the analysis. ” reads the analysis. org domain for C2.”
Since February, the attacks targeted organizations in critical manufacturing, IT, and Israel’s defense industry. . This circumstance is confirmed by revelations that emerged in the last couple of years that the Iranian government is using cyber mercenaries for its operations. ” reads the analysis published by Microsoft.
Most targeted sectors have been Government/Military (17% of all exploit attempts), followed by Manufacturing (14%), and then Banking (11%). A joint analysis conducted by Microsoft and RiskIQ allowed to identify more than 100,000 servers still vulnerable.
The hackers targeting organizations across multiple industries and have also targeted foreign governments, dissidents, and journalists. Since at least 2014, experts at FireEye have observed APT32 targeting foreign corporations with an interest in Vietnam’s manufacturing, consumer products, and hospitality sectors.
Rapid7 conducted an analysis on three distinct infusion pump models: the Alaris PC 8015, the Baxter Sigma Spectrum model 35700BAX2 along with its associated Wireless Battery Module (WBM), and the Hospira Abbott PLUM A+ with MedNet. ” reads the analysis published by Rapid7. . ” reads the analysis published by Rapid7.
The operation targeted many organizations in critical infrastructure sectors, including financial services, food and agriculture, education, energy, government and emergency services, healthcare, manufacturing, and transportation. organizations since 2020. law enforcement). According to the French ANSSI cybersecurity agency, LockBit 3.0
Lookout Threat Lab researchers uncovered enterprise-grade Android surveillance spyware, named Hermit, used by the government of Kazakhstan to track individuals within the country. ” reads the analysis published by Lookout. According to Lookout, the Hermit spyware was likely developed by Italian surveillance vendor RCS Lab S.p.A
RansomExx operation has been active since 2018, the list of its victims includes government agencies, the computer manufacturer and distributor GIGABYTE , and the Italian luxury brand Zegna. ” reads the analysis published by IBM Security X-Force.
” reads the joint analysis published by AdvIntel and Eclypsium. The Secure Boot mechanism allows the execution of only software that is trusted by the Original Equipment Manufacturer (OEM). ” continues the analysis. ” continues the post. ” continues the post.
The Raspberry Robin worm attacks aimed at telecommunications and government office systems across Latin America, Australia, and Europe. Researchers from Trend Micro have uncovered a Raspberry Robin worm campaign targeting telecommunications and government office systems across Latin America, Australia, and Europe. Pierluigi Paganini.
Security researchers from ESET have discovered a new piece of a sophisticated malware used by the Russia-linked Sednit group (aka Fancy Bear , APT28 , Pawn Storm , Sofacy Group , and STRONTIUM ) in targeted attacks aimed at government entities in the Balkans as well as in Central and Eastern Europe. ” continues the report.
” The MiCODUS MV720 GPS Tracker is a popular vehicle GPS tracker manufactured in China, which is used by consumers for theft protection and location management, and by organizations for vehicle fleet management. The analysis of the sector usage on a global scale revealed significant differences by continent in the typical user profile.
reads the advisory The vulnerability is a heap-based buffer overflow issue and according to the vendor it may have been exploited in a limited number of attacks aimed at government, manufacturing, and critical infrastructure sectors. ” states the analysis published by Bishop Fox. states the report published by Fortinet.
Cyber attacks conducted by the APT37 group mainly targeted government, defense, military, and media organizations in South Korea. The hackers targeted organizations in the chemicals, manufacturing, electronics, aerospace, healthcare, and automotive sectors. ” reads the analysis published by Kaspersky Lab.
The malicious code was likely designed for long-running espionage campaigns against government entities and critical infrastructure targets. ” continues the analysis. We will publish follow-up blogs over the coming days with more detailed technical analysis and other insights from our research and collaborations.”
Most of the infections were observed in organizations in the US and Europe, the most targeted industries were in the government, military, and manufacturing sectors. . ” reads the analysis published by CheckPoint.
The researchers shared a detailed analysis on Security Affairs , they explained that once the malware has infected a Windows machine, it overwrites the existing Master Boot Record, with a custom MBR and encrypts the hard drive using the DiskCryptor tool. DiskCryptor is not inherently malicious but has been weaponized.”
Since March, the attackers have been trying to conduct multistage attacks on large corporate networks of medical labs, banks, manufacturers, and software developers in Russia. In other instances, the gang exploited the COVID-19 theme and anti-government rallies in Belarus in their phishing emails. About Group-IB.
We organize all of the trending information in your field so you don't have to. Join 55,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content