Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 1 / 3
60 résultats taggé APT  ✕
Hackers exploited Citrix, Cisco ISE flaws in zero-day attacks https://www.bleepingcomputer.com/news/security/hackers-exploited-citrix-cisco-ise-flaws-in-zero-day-attacks/
12/11/2025 15:50:11
QRCode
archive.org
thumbnail

bleepingcomputer.com
By Bill Toulas
November 12, 2025

An advanced threat actor exploited the critical vulnerabilities “Citrix Bleed 2" (CVE-2025-5777) in NetScaler ADC and Gateway, and CVE-2025-20337 affecting Cisco Identity Service Engine (ISE) as zero-days to deploy custom malware.

Amazon’s threat intelligence team, analyzing “MadPot” honeypot data, found that hackers leveraged the two security issues before the security issues were disclosed publicly and patches became available.

“Our Amazon MadPot honeypot service detected exploitation attempts for the Citrix Bleed Two vulnerability (CVE-2025-5777) prior to public disclosure, indicating a threat actor had been exploiting the vulnerability as a zero-day,” explains Amazon.

“Through further investigation of the same threat exploiting the Citrix vulnerability, Amazon Threat Intelligence identified and shared with Cisco an anomalous payload targeting a previously undocumented endpoint in Cisco ISE that used vulnerable deserialization logic.”

Citrix Bleed 2 is a NetScaler ADC and Gateway out-of-bounds memory read problem that the vendor published fixes for in late June.

Although the vendor needed a longer period to confirm that the flaw was leveraged in attacks, despite multiple third-party reports claiming it was used in attacks, exploits became available in early July, and CISA tagged it as exploited.

The flaw in ISE (CVE-2025-20337), with a maximum severity score, was published on July 17, when Cisco warned that it could be exploited to let an unauthenticated attacker store malicious files, execute arbitrary code, or gain root privileges on vulnerable devices.

In less than five days, the vendor reissued its warning about CVE-2025-20337 being actively exploited. On July 28, researcher Bobby Gould published technical details in a write-up that included an exploit chain.

In a report shared with BleepingComputer, Amazon says that both flaws were leveraged in APT attacks before Cisco and Citrix published their initial security bulletins.

The hackers leveraged CVE-2025-20337 to gain pre-auth admin access to Cisco ISE endpoints, and deployed a custom web shell named ‘IdentityAuditAction,’ disguised as a legitimate ISE component.

The web shell registered as an HTTP listener to intercept all requests and used Java reflection to inject into Tomcat server threads.

It also employed DES encryption with non-standard base64 encoding for stealth, required knowledge of specific HTTP headers to access, and left minimal forensic traces behind.

The use of multiple undisclosed zero-day flaws and the advanced knowledge of Java/Tomcat internals and the Cisco ISE architecture all point to a highly resourced and advanced threat actor. However, Amazon could not attribute the activity to a known threat group.

Curiously, though, the targeting appeared indiscriminate, which doesn’t match the typically tight scope of highly targeted operations by such threat actors.

It is recommended to apply the available security updates for CVE-2025-5777 and CVE-2025-20337, and limit access to edge network devices through firewalls and layering.

bleepingcomputer.com EN 2025 APT Cisco-ISE Citrix CitrixBleed2 Vulnerability Zero-Day
How we linked ForumTroll APT to Dante spyware by Memento Labs https://securelist.com/forumtroll-apt-hacking-team-dante-spyware/117851/
27/10/2025 12:16:30
QRCode
archive.org
thumbnail

Kaspersky researchers discovered previously unidentified commercial Dante spyware developed by Memento Labs (formerly Hacking Team) and linked it to the ForumTroll APT attacks.

securelist.com EN 2025 Dante Targeted Team ForumTroll Cyber attacks Spyware Hacking espionage APT HackingTeam
TheWizards APT group uses SLAAC spoofing to perform adversary-in-the-middle attacks https://www.welivesecurity.com/en/eset-research/thewizards-apt-group-slaac-spoofing-adversary-in-the-middle-attacks/
01/05/2025 13:31:03
QRCode
archive.org
thumbnail

ESET researchers publish an analysis of Spellbinder, a lateral movement tool used to perform adversary-in-the-middle attacks.<<

  • We discovered a malicious downloader being deployed, by legitimate Chinese software update mechanisms, onto victims’ machines.
  • The downloader seeks to deploy a modular backdoor that we have named WizardNet.
  • We analyzed Spellbinder: the tool the attackers use to conduct local adversary-in-the-middle attacks and to redirect traffic to an attacker-controlled server to deliver the group’s signature backdoor WizardNet.
  • We provide details abouts links between TheWizards and the Chinese company Dianke Network Security Technology, also known as UPSEC.
welivesecurity EN 2025 TheWizards APT SLAAC UPSEC spoofing adversary-in-the-middle lateral-movement
Stealthy Attributes of APT Lazarus: Evading Detection with Extended Attributes https://www.group-ib.com/blog/stealthy-attributes-of-apt-lazarus/
14/11/2024 00:02:10
QRCode
archive.org

APT Lazarus has begun attempting to smuggle code using custom extended attributes.

Extended attributes are metadata that can be associated with files and directories in various file systems. They allow users to store additional information about a file beyond the standard attributes like file size, timestamps, and permissions.

group-ib EN 2024 Extended attributes macos Smuggling APT Lazarus
Threat Hunting Case Study: Uncovering Turla | Intel 471 https://intel471.com/blog/threat-hunting-case-study-uncovering-turla
13/11/2024 09:43:50
QRCode
archive.org
thumbnail

Russia has long been a military power, a nuclear power, a space power and in recent decades, a cyber power. It has been one of the most capable cyber actors, going back to the late 1990s when Russian state hackers stole classified documents and military research from U.S. universities and government agencies. The stolen documents, if stacked on top of one another, would have been taller than the Washington Monument (555 feet or 169 meters). These incidents, dubbed “Moonlight Maze” as described in Thomas Rid’s book “Rise of the Machines,” marked one of the world’s first advanced persistent threat (APT) attacks. Russia’s intelligence and security agencies continue to operate highly skilled groups of offensive attackers. Those APT groups are spread across its intelligence and security agencies and the Ministry of Defense. They engage in a broad range of cyber and influence operations tied to Russia’s strategic objectives. These include exploiting adversary systems, establishing footholds, conducting cyber espionage operations and running disinformation and misinformation campaigns designed to undermine Western narratives. One of the most effective and long-running Russian groups is Turla, a unit known as Center 16 housed within Russia’s Federal Security Service, or FSB. Researchers found that this group, which is active today, may have been connected with Moonlight Maze.

intel471 EN 2024 Turla case-study analysis APT Russia
Pacific Rim: Inside the Counter-Offensive—The TTPs Used to Neutralize China-Based Threats https://news.sophos.com/en-us/2024/10/31/pacific-rim-neutralizing-china-based-threat/
31/10/2024 16:27:18
QRCode
archive.org
thumbnail

Sophos X-Ops unveils five-year investigation tracking China-based groups targeting perimeter devices

sophos EN 2024 investigation China-based perimeter devices TTPs China APT
China-linked APT group Salt Typhoon compromised some US ISPs https://securityaffairs.com/168941/apt/salt-typhoon-china-linked-threat-actors-breached-us-isp.html?amp
27/09/2024 10:20:53
QRCode
archive.org
thumbnail

China-linked threat actors compromised some U.S. internet service providers as part of a cyber espionage campaign code-named Salt Typhoon.

The state-sponsored hackers aimed at gathering intelligence from the targets or carrying out disruptive cyberattacks.

The Wall Street Journal reported that experts are investigating into the security breached to determine if the attackers gained access to Cisco Systems routers, which are core network components of the ISP infrastructures.

securityaffairs EN 2024 China-linked APT Salt-Typhoon US ISP compromised Cisco
Chinese APT Abuses VSCode to Target Government in Asia https://unit42.paloaltonetworks.com/stately-taurus-abuses-vscode-southeast-asian-espionage/
14/09/2024 12:35:33
QRCode
archive.org
thumbnail

A first in our telemetry: Chinese APT Stately Taurus uses Visual Studio Code to maintain a reverse shell in victims' environments for Southeast Asian espionage. A first in our telemetry: Chinese APT Stately Taurus uses Visual Studio Code to maintain a reverse shell in victims' environments for Southeast Asian espionage.

unit42 EN 2024 China APT StatelyTaurus VisualStudio
CloudSorcerer APT uses cloud services and GitHub as C2 | Securelist https://securelist.com/cloudsorcerer-new-apt-cloud-actor/113056/
11/07/2024 09:57:32
QRCode
archive.org
thumbnail

Kaspersky discovered a new APT CloudSorcerer targeting Russian government entities and using cloud services as C2, just like the CloudWizard actor.

securelist Kaspersky EN 2024 APT Backdoor Cloud-services CloudWizard Cyber-espionage Dropbox Malware Malware-Technologies Targeted-attacks
Chinese Cyberspies Employ Ransomware in Attacks for Diversion https://www.bleepingcomputer.com/news/security/chinese-cyberspies-employ-ransomware-in-attacks-for-diversion/
27/06/2024 08:26:45
QRCode
archive.org
thumbnail

Cyberespionage groups have been using ransomware as a tactic to make attack attribution more challenging, distract defenders, or for a financial reward as a secondary goal to data theft.

bleepingcomputer EN 2024 APT BitLocker CatB ChamelGang Cyber-espionage Ransomware
Russian hackers use new Lunar malware to breach a European govt's agencies https://www.bleepingcomputer.com/news/security/russian-hackers-use-new-lunar-malware-to-breach-a-european-govts-agencies/#google_vignette
17/05/2024 09:25:27
QRCode
archive.org
thumbnail

Security researchers discovered two previously unseen backdoors dubbed LunarWeb and LunarMail that were used to compromise a European government's diplomatic institutions abroad.

bleepingcomputer EN 2024 APT Lunar LunarMail LunarWeb Malware Turla
To the Moon and back(doors): Lunar landing in diplomatic missions https://www.welivesecurity.com/en/eset-research/moon-backdoors-lunar-landing-diplomatic-missions/
17/05/2024 09:22:41
QRCode
archive.org
thumbnail

ESET researchers provide technical analysis of the Lunar toolset, likely used by the Turla APT group, that infiltrated a European ministry of foreign affairs

welivesecurity EN 2024 Lunar toolset Turla APT EU European ministry analysis
APT trends report Q1 2024 https://securelist.com/apt-trends-report-q1-2024/112473/
09/05/2024 12:41:51
QRCode
archive.org

For more than six years, the Global Research and Analysis Team (GReAT) at Kaspersky has been publishing quarterly summaries of advanced persistent threat (APT) activity. These summaries are based on our threat intelligence research. They provide a representative snapshot of what we have published and discussed in greater detail in our private APT reports. They are designed to highlight the significant events and findings that we feel people should be aware of.

securelist Kaspersky EN 2024 report APT Gelsemium Careto
Hacker free-for-all fights for control of home and office routers everywhere https://arstechnica.com/security/2024/05/hacker-free-for-all-fights-for-control-of-home-and-office-routers-everywhere/
03/05/2024 07:42:41
QRCode
archive.org
thumbnail

How and why nation-state hackers and cybercriminals coexist in the same router botnet.

arstechnica EN 2024 SOHO routers home IoT APT PawnStorm MooBot
The Updated APT Playbook: Tales from the Kimsuky threat actor group | Rapid7 Blog https://www.rapid7.com/blog/post/2024/03/20/the-updated-apt-playbook-tales-from-the-kimsuky-threat-actor-group/
21/03/2024 08:45:29
QRCode
archive.org
thumbnail

Within Rapid7 Labs we continually track and monitor threat groups. As part of this process, we routinely identify evolving tactics from threat groups in what is an unceasing game of cat and mouse.

Rapid7 EN 2024 APT TTPs Kimsuky Black Banshee Thallium North-Korea
Seedworm: Iranian Hackers Target Telecoms Orgs in North and East Africa https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/iran-apt-seedworm-africa-telecoms
21/12/2023 19:57:21
QRCode
archive.org
thumbnail

MuddyC2Go framework and custom keylogger used in attack campaign.
Iranian espionage group Seedworm (aka Muddywater) has been targeting organizations operating in the telecommunications sector in Egypt, Sudan, and Tanzania.

Seedworm has been active since at least 2017, and has targeted organizations in many countries, though it is most strongly associated with attacks on organizations in the Middle East. It has been publicly stated that Seedworm is a cyberespionage group that is believed to be a subordinate part of Iran’s Ministry of Intelligence and Security (MOIS).

symantec-enterprise-blogs EN 2023 Seedworm Irtan APT Muddywater MuddyC2Go framework keylogger
Winter Vivern exploits zero-day vulnerability in Roundcube Webmail servers https://www.welivesecurity.com/en/eset-research/winter-vivern-exploits-zero-day-vulnerability-roundcube-webmail-servers/
27/10/2023 08:24:41
QRCode
archive.org

ESET Research discover campaigns by the Winter Vivern APT group that exploit a zero-day XSS vulnerability in the Roundcube Webmail server and target governmental entities and a think tank in Europe.

welivesecurity ESET 2023 EN WinterVivern APT zero-day XSS vulnerability Roundcube
Triangulation: validators, post-compromise activity and modules | Securelist https://securelist.com/triangulation-validators-modules/110847/
26/10/2023 17:49:57
QRCode
archive.org
thumbnail

In this report Kaspersky shares insights into the validation components used in Operation Triangulation, TriangleDB implant post-compromise activity, as well as details of some additional modules.
#2023 #APT #Apple #EN #Malware #Malware-Description #Triangulation #analysis #iOS #macOS #securelist #spyware

EN macOS spyware Apple Malware-Description 2023 analysis APT iOS Triangulation securelist Malware
The New Frontline of Geopolitics | Understanding the Rise of State-Sponsored Cyber Attacks https://www.sentinelone.com/blog/the-new-frontline-of-geopolitics-understanding-the-rise-of-state-sponsored-cyber-attacks/
18/08/2023 14:35:53
QRCode
archive.org
thumbnail

Understanding the complex threat landscape facing businesses today from state-sponsored cyber attacks is crucial to effective cyber defense.

sentinelone EN 2023 APT research state-sponsored cyberdefense
JumpCloud says 'nation state' gang hit some customers https://www.theregister.com/2023/07/18/jumpcloud_commands_hacking/?s=09
20/07/2023 19:56:43
QRCode
archive.org
thumbnail

JumpCloud says a "sophisticated nation-state" attacker broke into its IT systems and targeted some of its customers.

The identity and access management provider, particularly popular with sysadmins wrangling Macs on corporate networks, said it first discovered signs of an intrusion on June 27. The biz at the time determined persons unknown got "unauthorized access to a specific area of our infrastructure" using a "sophisticated spear-phishing campaign" that began five days prior.

theregister EN 2023 APT jumpcloud
page 1 / 3
4879 links
Shaarli - Le gestionnaire de marque-pages personnel, minimaliste, et sans base de données par la communauté Shaarli - Theme by kalvn