Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 2 / 3
58 résultats taggé APT  ✕
Dissecting TriangleDB, a Triangulation spyware implant https://securelist.com/triangledb-triangulation-implant/110050/
21/06/2023 13:40:21
QRCode
archive.org
thumbnail

In researching Operation Triangulation, we set ourselves the goal to retrieve as many parts of the exploitation chain as possible. As of now, we have finished analyzing the spyware implant and are ready to share the details.
#2023 #APT #Apple #EN #Malware-Descriptions #Spyware #Targeted-attacks #Triangulation #iOS #malware #securelist

Apple Triangulation iOS 2023 Malware-Descriptions malware EN Spyware securelist APT Targeted-attacks
Uncovering RedStinger - Undetected APT cyber operations in Eastern Europe since 2020 https://www.malwarebytes.com/blog/threat-intelligence/2023/05/redstinger
12/05/2023 10:57:01
QRCode
archive.org
thumbnail

While the official conflict between Russia and Ukraine began in February 2022, there is a long history of physical conflict between the two nations, including the 2014 annexation of Crimea by Russia and when the regions of Donetsk and Luhansk declared themselves independent from Ukraine and came under Russia's umbrella. Given this context, it would not be surprising that the cybersecurity landscape between these two countries has also been tense.

malwarebytes EN 2023 APT RedStinger
Winter Vivern | Uncovering a Wave of Global Espionage https://www.sentinelone.com/labs/winter-vivern-uncovering-a-wave-of-global-espionage/
05/04/2023 08:19:24
QRCode
archive.org
thumbnail

SentinelLabs uncover a previously unknown set of espionage campaigns conducted by Winter Vivern advanced persistent threat (APT) group.

sentinelone EN 2023 APT WinterVivern anallysis Russia
Not just an infostealer: Gopuram backdoor deployed through 3CX supply chain attack | Securelist https://securelist.com/gopuram-backdoor-deployed-through-3cx-supply-chain-attack/109344/
04/04/2023 20:43:33
QRCode
archive.org
thumbnail

A DLL named guard64.dll, which was loaded into the infected 3CXDesktopApp.exe process, was used in recent deployments of a backdoor that we dubbed “Gopuram” and had been tracking internally since 2020.

securelist APT Backdoor Data-theft Lazarus Malware-Descriptions Gopuram guard64.dll 3CX
Iron Tiger’s SysUpdate Reappears, Adds Linux Targeting https://www.trendmicro.com/en_us/research/23/c/iron-tiger-sysupdate-adds-linux-targeting.html
01/03/2023 21:10:36
QRCode
archive.org
thumbnail

We detail the update that advanced persistent threat (APT) group Iron Tiger made on the custom malware family SysUpdate. In this version, we also found components that enable the malware to compromise Linux systems.

trendmicro malware cyber-crime apt IronTiger SysUpdate analysis
Uncle Sow: Dark Caracal in Latin America https://www.eff.org/deeplinks/2023/02/uncle-sow-dark-caracal-latin-america
12/02/2023 15:40:16
QRCode
archive.org
thumbnail

In 2018, EFF along with researchers from Lookout Security published a report describing the Advanced Persistent Threat (APT) we dubbed "Dark Caracal." Now we have uncovered a new Dark Caracal campaign operating since March of 2022, with hundreds of infections across more than a dozen countries. In this report we will present evidence that the cyber mercenary group Dark Caracal is still active and continues to be focused on Latin America, as was reported last year. We have discovered that Dark Caracal, using the Bandook spyware, is currently infecting over 700 computers in Central and South America, primarily in The Dominican Republic and Venezuela.

eff EN 2023 DarkCaracal APT LatinAmerica Venezuela campaign research
DNS changer in malicious mobile app used by Roaming Mantis https://securelist.com/roaming-mantis-dns-changer-in-malicious-mobile-app/108464/
20/01/2023 11:57:51
QRCode
archive.org
thumbnail

Roaming Mantis (a.k.a Shaoye) is a long-term cyberattack campaign that uses malicious Android package (APK) files to control infected Android devices and steal data. In 2022, we observed a DNS changer function implemented in its Android malware Wroba.o.

securelist EN 2023 APT RoamingMantis Google-Android Malware-Descriptions Shaoye Malware-Technologies Mobile-Malware Targeted-attacks Trojan
ZINC weaponizing open-source software - Microsoft Security Blog https://www.microsoft.com/en-us/security/blog/2022/09/29/zinc-weaponizing-open-source-software/
28/12/2022 11:39:07
QRCode
archive.org
thumbnail

In recent months, Microsoft has detected a wide range of social engineering campaigns using weaponized legitimate open-source software by an actor we track as ZINC. Microsoft Threat Intelligence Center (MSTIC) observed activity targeting employees in organizations across multiple industries including media, defense and aerospace, and IT services in the US, UK, India, and Russia. Based on the observed tradecraft, infrastructure, tooling, and account affiliations, MSTIC attributes this campaign with high confidence to ZINC, a state-sponsored group based out of North Korea with objectives focused on espionage, data theft, financial gain, and network destruction.

microsoft EN 2022 Microsoft weaponized ZINC open-source MSTIC apt North-Korea
ZetaNile: Open source software trojans from North Korea https://www.reversinglabs.com/blog/zetanile-open-source-software-trojans-from-north-korea
28/12/2022 11:38:24
QRCode
archive.org
thumbnail

ReversingLabs Malware Researcher Joseph Edwards takes a deep dive into ZetaNile, a set of open-source software trojans being used by Lazarus/ZINC.

reversinglabs EN 2022 ZetaNile Malware deepdive apt Lazarus ZINC open-source trojans
Raspberry Robin Malware Targets Telecom, Governments https://www.trendmicro.com/en_us/research/22/l/raspberry-robin-malware-targets-telecom-governments.html
26/12/2022 23:06:07
QRCode
archive.org
thumbnail

We found samples of the Raspberry Robin malware spreading in telecommunications and government office systems beginning September. The main payload itself is packed with more than 10 layers for obfuscation and is capable of delivering a fake payload once it detects sandboxing and security analytics tools.

trendmicro EN 2022 malware apt endpoints RaspberryRobin obfuscation analysis
Iranian Government-Sponsored APT Actors Compromise Federal Network, Deploy Crypto Miner, Credential Harvester https://www.cisa.gov/uscert/ncas/alerts/aa22-320a
17/11/2022 08:59:13
QRCode
archive.org

From mid-June through mid-July 2022, CISA conducted an incident response engagement at a Federal Civilian Executive Branch (FCEB) organization where CISA observed suspected advanced persistent threat (APT) activity. In the course of incident response activities, CISA determined that cyber threat actors exploited the Log4Shell vulnerability in an unpatched VMware Horizon server, installed XMRig crypto mining software, moved laterally to the domain controller (DC), compromised credentials, and then implanted Ngrok reverse proxies on several hosts to maintain persistence.

cisa EN 2022 uscert csirt cert cybersecurity cyber-security Log4Shell VM APT Iran USware
Unmasking WindTape - Speaker Deck https://speakerdeck.com/patrickwardle/unmasking-windtape
02/11/2022 09:12:22
QRCode
archive.org
thumbnail

The offensive macOS cyber capabilities of the WINDSHIFT APT group provide us with the opportunity to gain insight into the Apple-specific approaches employed by an advanced adversary.

In this talk we’ll comprehensively dissect OSX.WindTape, a second-stage tool utilized by the WINDSHIFT APT group when targeting Apple systems.

First we’ll discuss the malware’s anti-analysis mechanisms, and then once these have been thwarted, we’ll explore its capabilities. To conclude, we’ll present heuristic methods that can generically both detect and prevent WindTape, as well as other advanced macOS threats.

patrickwardle EN 2022 WINDSHIFT APT macOS
LV Ransomware Exploits ProxyShell in Attack on a Jordan-based Company https://www.trendmicro.com/en_us/research/22/j/lv-ransomware-exploits-proxyshell-in-attack.html
26/10/2022 20:19:52
QRCode
archive.org
thumbnail

Our blog entry provides a look at an attack involving the LV ransomware on a Jordan-based company from an intrusion analysis standpoint

trendmicro EN 2022 ProxyShell endpoints targeted-attacks ransomware research APT REvil Sodinokibi
POLONIUM targets Israel with Creepy malware https://www.welivesecurity.com/2022/10/11/polonium-targets-israel-creepy-malware/
13/10/2022 10:07:59
QRCode
archive.org
thumbnail

ESET researchers analyzed previously undocumented custom backdoors and cyberespionage tools deployed in Israel by the POLONIUM APT group.

welivesecurity EN 2022 research POLONIUM Israel malware APT
Charming Kitten: “Can We Have A Meeting?” https://blog.certfa.com/posts/charming-kitten-can-we-wave-a-meeting/
14/09/2022 14:37:07
QRCode
archive.org
thumbnail

Our recent investigation at Certfa Lab, the APT42 has been running multiple phishing campaigns since late 2021 and some of them are ongoing and still active.

certfa EN 2022 Charming-Kitten APT Iran Phishing Espionage-Operations Sophisticated-Attacks investigation
Kimsuky’s GoldDragon cluster and its C2 operations | Securelist https://securelist.com/kimsukys-golddragon-cluster-and-its-c2-operations/107258/
28/08/2022 16:28:02
QRCode
archive.org
thumbnail

Kimsuky is a prolific and active threat actor primarily targeting Korea-related entities. In early 2022, we observed this group was attacking the media and a think-tank in South Korea.

securelist 2022 EN APT Keyloggers Kimsuky Malware-Descriptions Microsoft-Word Spear-phishing Targeted-attacks North-Korea
Justice Department seizes $500K from North Korean hackers who targeted US medical organizations https://edition.cnn.com/2022/07/19/politics/justice-department-north-korea-hackers-ransomware/index.html
24/07/2022 23:25:34
QRCode
archive.org
thumbnail

The US Justice Department seized approximately half a million dollars that North Korean government-backed hackers had either extorted from US health care organizations or used to launder ransom payments, deputy Attorney General Lisa Monaco said Tuesday as she touted an aggressive US strategy to claw back money for victims of ransomware attacks.

CNN EN 2022 APT north-korea US seized government-backed medical ransomware
China: Declaration by the Minister for Foreign Affairs on behalf of the Belgian Government urging Chinese authorities to take action against malicious cyber activities undertaken by Chinese actors https://diplomatie.belgium.be/en/news/declaration-minister-foreign-affairs-malicious-cyber-activities?fbclid=IwAR2KVRIkiaeO-ZGXpKh-rPUdy9cfAQA765RlwuiCmFdpXrwwm4lN_Vji88E&fs=e&s=cl
20/07/2022 08:31:21
QRCode
archive.org
thumbnail

Declaration by the Minister for Foreign Affairs on behalf of the Belgian Government urging Chinese authorities to take action against malicious cyber activities undertaken by Chinese actors.

Belgium EN 2022 Minister Foreign Affairs China APT APT27 APT30 APT31 attribution official statement
Why the Equation Group (EQGRP) is NOT the NSA | xorl %eax, %eax https://xorl.wordpress.com/2022/07/06/why-the-equation-group-eqgrp-is-not-the-nsa/
07/07/2022 19:07:22
QRCode
archive.org
thumbnail

I had covered this topic in my 2021 talk “In nation-state actor’s shoes” but after my recent blog post I saw again people referring to the EQGRP as the NSA which is not entirely c…

xorl 2022 EN EquationGroup CIA NSA APT
When Pentest Tools Go Brutal: Red-Teaming Tool Being Abused by Malicious Actors https://unit42.paloaltonetworks.com/brute-ratel-c4-tool/
07/07/2022 07:30:53
QRCode
archive.org

Unit 42 continuously hunts for new and unique malware samples that match known advanced persistent threat (APT) patterns and tactics. On May 19, one such sample was uploaded to VirusTotal, where it received a benign verdict from all 56 vendors that evaluated it. Beyond the obvious detection concerns, we believe this sample is also significant in terms of its malicious payload, command and control (C2), and packaging.

unit42 EN 2022 BruteRatelC4 CobaltStrike redteam APT BRc4 C2 malware
page 2 / 3
4371 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio