article thumbnail

Cisco addressed Webex flaws used to compromise German government meetings

Security Affairs

In March, the German authorities admitted the hack by Russia-linked actors of a military meeting where participants discussed giving military support to Ukraine. Cisco notified customers who experienced observable attempts to access meeting information and metadata. ” reads the advisory published by the company. .

article thumbnail

Ukraine intelligence doxed 5 FSB Officers that are members of Gamaredon APT Group

Security Affairs

The group targeted government and military organizations in Ukraine. In December 2019, the APT group targeted several Ukrainian diplomats, government and military officials, and law enforcement. The Gamaredon group was first discovered by Symantec and TrendMicro in 2015, but evidence of its activities has been dated back to 2013.

Military 349
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Experts spotted two Android spyware used by Indian APT Confucius

Security Affairs

The two malware were used to spy on personnel linked to Pakistan’s military, nuclear authorities, and Indian election officials in Kashmir. ” Both malware can exfiltrate a wide range of data, including Call logs, Contacts, Device metadata (i.e. ” reads the report published by Lookout.

Metadata 359
article thumbnail

NK-linked InkySquid APT leverages IE exploits in recent attacks

Security Affairs

APT37 has been active since at least 2012, it mainly targeted government, defense, military, and media organizations in South Korea. Supports: Win7 IE, Win10 IE, Edge, Chrome, and Naver Whale Recursively search a path and upload file metadata (timestamps, size, and full path). ” reads the post published by Volexity.

Metadata 300
article thumbnail

GUEST ESSAY: How tech tricks used by Amazon, Netflix aid Ukraine in repelling Russia’s invasion

The Last Watchdog

Accessing video-based intelligence at the right time and place is a very effective method for gaining information about the constantly changing military landscape. Value of protocols Technological innovations have widely been credited for helping Ukraine even the odds against Russia’s military might.

Metadata 130
article thumbnail

Swiss army asks its personnel to use the Threema instant-messaging app

Security Affairs

Anyway, depending on the single encrypted messaging apps, law enforcement could extract varying metadata that could allow unmasking the end-users. What is strange is while the Swiss Army is asking military personnel to use Threema as private users instead of using the business version known as Threema Work. Pierluigi Paganini.

FOIA 308
article thumbnail

Latest Turla backdoor leverages email PDF attachments as C&C mechanism

Security Affairs

“These organizations are the latest known additions to the list of victims of this APT group that has been targeting governments, state officials, diplomats, and military authorities since at least 2008.” ” Information is exfiltrated by generating a PDF with the siphoned data and sent out via emails and message metadata.

Metadata 176