article thumbnail

Operation Blacksmith: Lazarus exploits Log4j flaws to deploy DLang malware

Security Affairs

The experts observed the use of NineRAT at around September 2023 against a European manufacturing entity. Talos believes that NineRAT was built around May 2022, but was first spotted on March 2023 as part of Operation Blacksmith. In March, the threat actors hit a South American agricultural organization.

article thumbnail

Australian Defense Department will replace surveillance cameras from Chinese firms Hikvision and Dahua

Security Affairs

An internal audit of surveillance equipment in Australian government and agency offices revealed the presence of more than 900 built systems manufactured by Chinese companies Hikvision and Dahua. The decision of the Australian government is aligned with similar decisions taken by the US and UK governments.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

USB drives are primary vector for destructive threats to industrial facilities

Security Affairs

Experts from Honeywell analyzed data collected with the Secure Media Exchange (SMX) , a product it has launched in 2017 and that was designed to protect industrial facilities from USB-borne threats.

IoT 279
article thumbnail

Antlion APT group used a custom backdoor that allowed them to fly under the radar for months

Security Affairs

A China-linked APT group tracked as Antlion is using a custom backdoor called xPack in attacks aimed at financial organizations and manufacturing companies, Symantec researchers reported. ” xPack allowed threat actors to run WMI commands remotely and mount shares over SMB to transfer data from C2 servers to them.

article thumbnail

Smart manufacturing technology is transforming mass production

IBM Big Data Hub

Smart manufacturing (SM)—the use of advanced, highly integrated technologies in manufacturing processes—is revolutionizing how companies operate. Smart manufacturing, as part of the digital transformation of Industry 4.0 , deploys a combination of emerging technologies and diagnostic tools (e.g.,

article thumbnail

Android Apps containing Clicker Trojan installed on over 100M devices

Security Affairs

Data collected by the malware include manufacturer and model, OS version, country of residence of the user, the default language of the system, user agent identifier, name of mobile operator, type of internet connection, screen options, time zone, and information about the tainted application containing the Trojan.

article thumbnail

Raspberry Robin operators are selling initial access to compromised enterprise networks to ransomware gangs

Security Affairs

Data collected by Microsoft Defender for Endpoint shows that nearly 3,000 devices in almost 1,000 organizations have seen at least one RaspberryRobin payload-related alert in the last 30 days. DEV-0950 group used Clop ransomware to encrypt the network of organizations previously infected with the Raspberry Robin worm.