Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 2 / 9
178 résultats taggé Russia  ✕
Multiple Russian Threat Actors Targeting Microsoft Device Code Authentication https://www.volexity.com/blog/2025/02/13/multiple-russian-threat-actors-targeting-microsoft-device-code-authentication/
14/02/2025 08:28:11
QRCode
archive.org
thumbnail

Starting in mid-January 2025, Volexity identified several social-engineering and spear-phishing campaigns by Russian threat actors aimed at compromising Microsoft 365 (M365) accounts. These attack campaigns were highly targeted and carried out in a variety of ways. The majority of these attacks originated via spear-phishing emails with different themes. In one case, the eventual breach began with highly tailored outreach via Signal.Through its investigations, Volexity discovered that Russian threat actors were impersonating a variety of individuals

volexity EN 2025 Russia spearphishing M365 social-engineering
New UK sanctions target Russian cybercrime network https://www.gov.uk/government/news/new-uk-sanctions-target-russian-cybercrime-network?ref=metacurity.com
11/02/2025 17:16:11
QRCode
archive.org
thumbnail

A key Russian cybercrime syndicate responsible for aiding merciless ransomware attacks around the world has been targeted by new UK sanctions.

gov.uk EN 2025 Russia cybercrime syndicate sanctions LockBit Zservers
How Switzerland is caught up in Russia’s propaganda machine https://www.swissinfo.ch/eng/foreign-affairs/how-switzerland-is-caught-up-in-russias-propaganda-machine/88785511
03/02/2025 12:03:24
QRCode
archive.org
thumbnail

How Russian propaganda challenges Switzerland's neutrality, using disinformation to sway public opinion in the Ukraine war.

swissinfo EN 2025 Switzerland Russia propaganda Ukraine
Norway seizes ship suspected of sabotage, says crew are Russian nationals https://therecord.media/norway-seizes-ship-suspected-sabotage
31/01/2025 16:13:20
QRCode
archive.org
thumbnail

The Silver Dania is the third ship detained in recent weeks over concerns of intentional damage to subsea infrastructure in the Baltic Sea.

therecord.media EN 2025 Norway cable sabotage Russia Baltic Sea
Sweden launches sabotage probe after another data cable damaged in Baltic Sea Europe https://www.france24.com/en/europe/20250126-another-undersea-cable-damaged-in-baltic-sea-latvia-dispatches-warship
27/01/2025 09:27:17
QRCode
archive.org

Another undersea data cable, this time connecting Sweden and Latvia, has been severed in the Baltic Sea, officials from both countries said Sunday. The incident prompted Sweden to launch a criminal probe into the matter and seize a "suspect vessel" vessel headed for Russia.

france24 EN 2025 cable Sweden Latvia Baltic undersea sabotage Russia
How A Large-Scale Russian Botnet Operation Stays Under the Radar https://blogs.infoblox.com/threat-intelligence/one-mikro-typo-how-a-simple-dns-misconfiguration-enables-malware-delivery-by-a-russian-botnet/
26/01/2025 12:15:21
QRCode
archive.org
thumbnail

Russian threat actors combine domain name vulnerabilities with hidden router proxy techniques to scale their attacks while remaining shielded from detection.

infoblox EN 2025 Mikrotik Botnet Russia proxy Large-Scale
Russian ISP confirms Ukrainian hackers "destroyed" its network https://www.bleepingcomputer.com/news/security/russian-isp-confirms-ukrainian-hackers-destroyed-its-network/
09/01/2025 16:38:15
QRCode
archive.org
thumbnail

Russian internet service provider Nodex confirmed on Tuesday that its network was

bleepingcomputer EN 2024 Breach Hacktivism ISP Nodex Russia Ukraine Ukrainian-Cyber-Alliance
Finnish police detain Russian 'ghost fleet' ship crew as cable damage probe continues https://www.euronews.com/my-europe/2025/01/03/police-in-finland-say-eagle-s-crew-detained-as-estlink-2-cable-damage-probe-continues
03/01/2025 12:19:47
QRCode
archive.org

The Eagle S is suspected of damaging the Estlink-2 power cable which runs under the Baltic Sea between Finland and Estonia by dragging its anchor along the seabed on Christmas Day.

Police in Finland say the crew of a Russia-linked tanker suspected of damaging a power cable under the Baltic Sea have been detained indefinitely.

The Eagle S crew consists of 24 people with Finland’s Central Criminal Police imposing movement restrictions on eight.

euronews EN 2025 Finland Russia sabotage cables Balric sea shadow-fleet
Finland identifies seven suspects among crew of alleged Russian 'spy' tanker https://therecord.media/finland-suspects-identified-alleged-russian-spy-ship
31/12/2024 16:59:47
QRCode
archive.org
thumbnail

Seven crew members of the seized ship Eagle S are being treated as suspects as Finland investigates undersea cable sabotage and alleged Russian spying.

therecord.media EN 2024 Finland Russia cable sabotage
Finnish authorities board ship suspected of cutting subsea Internet and power cables https://www.datacenterdynamics.com/en/news/finnish-authorities-board-ship-suspected-of-cutting-subsea-internet-and-power-cables/
27/12/2024 10:50:37
QRCode
archive.org

Four Internet cables cut in latest Baltic Sea incident

datacenterdynamics EN 2024 Finland Baltic cables internet disrupted subsea Russia
Russia is using bitcoin in foreign trade, finance minister says https://www.reuters.com/markets/currencies/russia-is-using-bitcoin-foreign-trade-finance-minister-says-2024-12-25/
26/12/2024 14:37:24
QRCode
archive.org

Russian companies have begun using bitcoin and other digital currencies in international payments following legislative changes that allowed such use in order to counter Western sanctions, Finance Minister Anton Siluanov said on Wednesday.
Sanctions have complicated Russia's trade with its major partners such as China or Turkey, as local banks are extremely cautious with Russia-related transactions to avoid scrutiny from Western regulators.

reuters EN 2024 crypto Russia currencies sanctions trade
Inside Operation Destabilise: How a ransomware investigation linked Russian money laundering and street-level drug dealing https://therecord.media/operation-destabilise-money-laundering-investigation-uk-nca
23/12/2024 13:44:58
QRCode
archive.org
thumbnail

U.K. investigators tell the story of how examining a cybercrime group's extortion funds helped to unravel a money-laundering network reaching from the illegal drug trade to Moscow's elite.

therecord.media EN 2024 Operation-Destabilise ransomware Russia UK cybercrime money-laundering
DHS Says China, Russia, Iran, and Israel Are Spying on People in US with SS7 https://www.404media.co/dhs-says-china-russia-iran-and-israel-are-spying-on-people-in-us-with-ss7/
20/12/2024 09:11:28
QRCode
archive.org
thumbnail

The Department of Homeland Security knows which countries SS7 attacks are primarily originating from. Others include countries in Europe, Africa, and the Middle East.

404media EN 2024 SS7 China Russia Iran Israel spy US attacks telco
Russian Spies Jumped From One Network to Another Via Wi-Fi in an Unprecedented Hack | WIRED https://www.wired.com/story/russia-gru-apt28-wifi-daisy-chain-breach/
22/11/2024 14:02:52
QRCode
archive.org
thumbnail

In a first, Russia's APT28 hacking group appears to have remotely breached the Wi-Fi of an espionage target by hijacking a laptop in another building across the street.

wired EN 2024 russia hacking Wi-Fi espionage hijacking APT28
PROSPERO & Proton66: Tracing Uncovering the links between bulletproof networks https://www.intrinsec.com/prospero-proton66-tracing-uncovering-the-links-between-bulletproof-networks/
21/11/2024 17:17:03
QRCode
archive.org
  • The Russian autonomous system PROSPERO (AS200593) could be linked with a high level of confidence to Proton66 (AS198953), another Russian AS, that we believe to be connected to the bulletproof services named ‘SecureHost‘ and ‘BEARHOST‘. We notably observed that both network’s configurations are almost identical in terms of peering agreements and their respective share of loads throughout time.
  • Amongst the activities shared by the two networks, we noticed that both GootLoader and SpyNote malwares recently changed their infrastructure of command-and-control servers and phishing pages from to Proton66. Additionally, the domains hosting the phishing pages deploying SpyNote were hosted on either one of the two AS and had already been used in previous campaigns delivering revoked AnyDesk and LiveChat versions for both Windows and Mac.
  • Regarding the other malicious activities found on PROSPERO’s IPs, we found that throughout September, multiple SMS spam campaigns targeting citizens from various countries were leading to phishing domains hosted on PROSPERO and Proton66. While most phishing templates were usurping bank login pages to steal credit card details, we also noticed that some of them were used to deploy android spywares such as Coper (a.k.a. Octo).
  • SocGholish, another initial access broker (IAB) that we found to be hosting a major part of its infrastructure on Proton66, continues to leverage this autonomous system to host fingerprinting scripts contained on the websites it infects. Along SocGholish, we found out that FakeBat, another loader that infects systems through compromised websites, was using the same IPs to host both screening and redirection script
intrinsec EN 2024 AS200593 AS198953 PROSPERO GootLoader SpyNote Russia bulletproof BEARHOST SocGholish
Threat Hunting Case Study: Uncovering Turla | Intel 471 https://intel471.com/blog/threat-hunting-case-study-uncovering-turla
13/11/2024 09:43:50
QRCode
archive.org
thumbnail

Russia has long been a military power, a nuclear power, a space power and in recent decades, a cyber power. It has been one of the most capable cyber actors, going back to the late 1990s when Russian state hackers stole classified documents and military research from U.S. universities and government agencies. The stolen documents, if stacked on top of one another, would have been taller than the Washington Monument (555 feet or 169 meters). These incidents, dubbed “Moonlight Maze” as described in Thomas Rid’s book “Rise of the Machines,” marked one of the world’s first advanced persistent threat (APT) attacks. Russia’s intelligence and security agencies continue to operate highly skilled groups of offensive attackers. Those APT groups are spread across its intelligence and security agencies and the Ministry of Defense. They engage in a broad range of cyber and influence operations tied to Russia’s strategic objectives. These include exploiting adversary systems, establishing footholds, conducting cyber espionage operations and running disinformation and misinformation campaigns designed to undermine Western narratives. One of the most effective and long-running Russian groups is Turla, a unit known as Center 16 housed within Russia’s Federal Security Service, or FSB. Researchers found that this group, which is active today, may have been connected with Moonlight Maze.

intel471 EN 2024 Turla case-study analysis APT Russia
UK Ambulance Services targeted by Kremlin-protected Russian hackers https://inews.co.uk/news/uk-ambulance-services-targeted-hackers-russia-kremlin-3317208
14/10/2024 08:49:06
QRCode
archive.org
thumbnail

A cyber security expert warns the hack, uncovered by i, presents a 'terrible threat to public health safety'

inews.co.uk EN 2024 UK Ambulance Services targeted Russia disruption
U.S., Microsoft seize over 100 websites allegedly used by Russian spies https://www.nbcnews.com/tech/security/us-microsoft-seize-100-websites-allegedly-used-russian-spies-rcna173784
10/10/2024 22:27:09
QRCode
archive.org
thumbnail

The FBI and Microsoft have seized more than 100 web domains they say Russian intelligence used for cyber-espionage, according to court documents unsealed Thursday.

nbcnews EN 2024 FBI domains US Russia spies FSB espionnage
Ukraine Claims Cyberattack Blocked Russian State TV Online on Putin’s Birthday https://www.bloomberg.com/news/articles/2024-10-07/ukraine-claims-cyberattack-blocked-russian-state-tv-online-on-putin-s-birthday?embedded-checkout=true
08/10/2024 06:49:27
QRCode
archive.org
thumbnail

Ukrainian hackers carried out a cyberattack that took down online broadcasts of Russian state television and radio channels on Monday, according to an official in Kyiv with knowledge of the operation.
#A #Dmitry #Emerging #Europe #Infrastructure #Markets #Media #Peskov #Putin #Radio #Russia #Ukraine #Vladimir #business #cybersecni #cybersecurity #politics #technology

bloomberg EN 2024 Russia Russia-Ukraine-war cyberattack broadcasts Ukraine State-TV Putin
Further Evil Corp cyber criminals exposed, one unmasked as LockBit affiliate - National Crime Agency https://www.nationalcrimeagency.gov.uk/news/further-evil-corp-cyber-criminals-exposed-one-unmasked-as-lockbit-affiliate
06/10/2024 23:11:25
QRCode
archive.org
thumbnail

Sixteen individuals who were part of Evil Corp, once believed to be the most significant cybercrime threat in the world, have been sanctioned in the UK, with their links to the Russian state and other prolific ransomware groups, including LockBit, exposed.

Sanctions have also been imposed by Australia and the US, who have unsealed an indictment against a key member of the group.

nationalcrimeagency EN 2024 organised-crime Evil-Corp UK Russia LockBit
page 2 / 9
4477 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio