Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 2 / 3
46 résultats taggé mandiant  ✕
Sandworm Disrupts Power in Ukraine Using a Novel Attack Against Operational Technology https://www.mandiant.com/resources/blog/sandworm-disrupts-power-ukraine-operational-technology
09/11/2023 18:36:15
QRCode
archive.org
thumbnail

This ICS/OT attack represents the latest evolution in Russia's cyber physical attack capability.

mandiant EN 2023 Sandworm Ukraine Russia Russia-Ukraine-war ICS
Diving Deep into UNC4841 Operations Following Barracuda ESG Zero-Day Remediation (CVE-2023-2868) https://www.mandiant.com/resources/blog/unc4841-post-barracuda-zero-day-remediation
29/08/2023 21:02:01
QRCode
archive.org
thumbnail

UNC4841 has continued operations despite Barracuda ESG zero-day remediation efforts.

mandiant EN 2023 UNC4841 Barracuda ESG 0-day CVE-2023-2868
Stealth Mode: Chinese Cyber Espionage Actors Continue to Evolve Tactics to Avoid Detection | Mandiant https://www.mandiant.com/resources/blog/chinese-espionage-tactics
15/08/2023 09:19:01
QRCode
archive.org
thumbnail

Ways Chinese cyber espionage activity has increasingly leveraged strategies to evade detection.

mandiant EN 2023 espionage Stealth detection evasion UNC3886
The Spies Who Loved You: Infected USB Drives to Steal Secrets https://www.mandiant.com/resources/blog/infected-usb-steal-secrets
12/07/2023 10:01:01
QRCode
archive.org
thumbnail

In the first half of 2023, we observed a threefold increase in the number of attacks using infected USB drives to steal secrets.

mandiant EN 2023 USB drives steal SOGU Malware SNOWYDRIVE
VMware ESXi Zero-Day Used by Chinese Espionage Actor to Perform Privileged Guest Operations on Compromised Hypervisors https://www.mandiant.com/resources/blog/vmware-esxi-zero-day-bypass
27/06/2023 21:45:57
QRCode
archive.org
thumbnail

Additional techniques UNC3886 utilized across multiple organizations to evade EDR solutions.

mandiant EN 2023 ESXi Zero-Day CVE-2023-20867 CVE-2022-22948 VMware
Barracuda ESG Zero-Day Vulnerability (CVE-2023-2868) Exploited Globally by Aggressive and Skilled Actor, Suspected Links to China https://www.mandiant.com/resources/blog/barracuda-esg-exploited-globally
16/06/2023 00:57:42
QRCode
archive.org
thumbnail

Mandiant is investigating a Barracuda ESG appliance zero-day vulnerability being exploited in the wild.

mandiant EN 2023 Barracuda ESG Zero-Day CVE-2023-2868 China
Zero-Day Vulnerability in MOVEit Transfer Exploited for Data Theft https://www.mandiant.com/resources/blog/zero-day-moveit-data-theft
03/06/2023 18:10:00
QRCode
archive.org
thumbnail

Analysis of a zero-day vulnerability in MOVEit Transfer, and containment and hardening guidance.

mandiant EN 2023 0-day MOVEit Transfer Vulnerability analysis
COSMICENERGY: New OT Malware Possibly Related To Russian Emergency Response Exercises | Mandiant https://www.mandiant.com/resources/blog/cosmicenergy-ot-malware-russian-response
25/05/2023 20:17:56
QRCode
archive.org
thumbnail

Mandiant identified novel operational technology (OT) / industrial control system (ICS)-oriented malware, which we track as COSMICENERGY, uploaded to a public malware scanning utility in December 2021 by a submitter in Russia. The malware is designed to cause electric power disruption by interacting with IEC 60870-5-104 (IEC-104) devices, such as remote terminal units (RTUs), that are commonly leveraged in electric transmission and distribution operations in Europe, the Middle East, and Asia.

mandiant EN 2023 COSMICENERGY Malware ICS (ICS)-oriented
Don't @ Me: URL Obfuscation Through Schema Abuse https://www.mandiant.com/resources/blog/url-obfuscation-schema-abuse
23/05/2023 21:41:16
QRCode
archive.org
thumbnail

Attackers are distributing malware using a technique that abuses the URL schema.

mandiant EN 2023 Obfuscation URL Schema Smokeloader
SIM Swapping and Abuse of the Microsoft Azure Serial Console: Serial Is Part of a Well Balanced Attack https://www.mandiant.com/resources/blog/sim-swapping-abuse-azure-serial
17/05/2023 08:16:57
QRCode
archive.org
thumbnail

Attacker activity in Microsoft Azure that we attribute to a financially motivated threat actor.

mandiant EN 2023 Azure Azure-Serial-Console UNC3944
3CX Software Supply Chain Compromise Initiated by a Prior Software Supply Chain Compromise; Suspected North Korean Actor Responsible https://www.mandiant.com/resources/blog/3cx-software-supply-chain-compromise
20/04/2023 14:04:45
QRCode
archive.org
thumbnail

A software supply chain attack led to another software supply chain attack.

mandiant EN 2023 3CX analysis Supply-Chain-Attack
ALPHV Ransomware Affiliate Targets Vulnerable Backup Installations to Gain Initial Access https://www.mandiant.com/resources/blog/alphv-ransomware-backup
08/04/2023 01:09:27
QRCode
archive.org
thumbnail

A ransomware affiliate is targeting publicly exposed Veritas installations to gain access to organizations.

mandiant EN 2023 ALPHV Ransomware Affiliate Vulnerable Backup Veritas
Move, Patch, Get Out the Way: 2022 Zero-Day Exploitation Continues at an Elevated Pace https://www.mandiant.com/resources/blog/zero-days-exploited-2022
22/03/2023 08:02:20
QRCode
archive.org
thumbnail
  • Mandiant tracked 55 zero-day vulnerabilities that we judge were exploited in 2022. Although this count is lower than the record-breaking 81 zero-days exploited in 2021, it still represents almost triple the number from 2020.
  • Chinese state-sponsored cyber espionage groups exploited more zero-days than other cyber espionage actors in 2022, which is consistent with previous years.
  • We identified four zero-day vulnerabilities exploited by financially motivated threat actors. 75% of these instances appear to be linked to ransomware operations.
  • Products from Microsoft, Google, and Apple made up the majority of zero-day vulnerabilities in 2022, consistent with previous years. The most exploited product types were operating systems (OS) (19), followed by browsers (11), security, IT, and network management products (10), and mobile OS (6).
mandiant EN 2022 2023 zero-day zero-days vulnerabilities exploited review
Fortinet Zero-Day and Custom Malware Used by Suspected Chinese Actor in Espionage Operation https://www.mandiant.com/resources/blog/fortinet-malware-ecosystem
17/03/2023 21:06:14
QRCode
archive.org
thumbnail

A suspected Chinese actor used a zero-day vulnerability in FortiOS and custom malware for espionage.

mandiant EN 2023 zero-day FortiOS China malware Suspected
Welcome to Goot Camp: Tracking the Evolution of GOOTLOADER Operations https://www.mandiant.com/resources/blog/tracking-evolution-gootloader-operations
31/01/2023 22:54:57
QRCode
archive.org
thumbnail

We have been seeing notable changes to TTPs used in GOOTLOADER operations since 2022.

mandiant EN 2023 GOOTLOADER 2022 TTPs Operations
From RM3 to LDR4: URSNIF Leaves Banking Fraud Behind https://www.mandiant.com/resources/blog/rm3-ldr4-ursnif-banking-fraud
21/10/2022 21:32:38
QRCode
archive.org
thumbnail

A new variant of the URSNIF malware, first observed in June 2022, marks an important milestone for the tool. Unlike previous iterations of URSNIF, this new variant, dubbed LDR4, is not a banker, but a generic backdoor (similar to the short-lived SAIGON variant), which may have been purposely built to enable operations like ransomware and data theft extortion. This is a significant shift from the malware’s original purpose to enable banking fraud, but is consistent with the broader threat landscape.

mandiant EN 2022 URSNIF backdoor Banking malware Gozi CUTWAIL spam
The Fresh Phish Market: Behind the Scenes of the Caffeine Phishing-as-a-Service Platform https://www.mandiant.com/resources/blog/caffeine-phishing-service-platform
11/10/2022 08:42:18
QRCode
archive.org
thumbnail

Bad actors are using a shared Phishing-as-a-Service platform called “Caffeine”.

mandiant EN 2022 Caffeine Phishing-as-a-Service Platform
Bad VIB(E)s Part One: Investigating Novel Malware Persistence Within ESXi Hypervisors | Mandiant https://www.mandiant.com/resources/blog/esxi-hypervisors-malware-persistence
03/10/2022 20:11:54
QRCode
archive.org
thumbnail

Earlier this year, Mandiant identified a novel malware ecosystem impacting VMware ESXi, Linux vCenter servers, and Windows virtual machines that enables a threat actor to take the following actions:

1) Maintain persistent administrative access to the hypervisor
2) Send commands to the hypervisor that will be routed to the guest VM for execution
3) Transfer files between the ESXi hypervisor and guest machines running beneath it
4) Tamper with logging services on the hypervisor

mandiant EN 2022 esxi hypervisors malware BadVIB(E)s 0-day
Mystery Hackers Are ‘Hyperjacking’ Targets for Insidious Spying https://www.wired.com/story/hyperjacking-vmware-mandiant/
01/10/2022 01:07:10
QRCode
archive.org
thumbnail

For decades, security researchers warned about techniques for hijacking virtualization software. Now one group has put them into practice.

wired 2022 EN hacking virtualization Hyperjacking malware Blue-Pill Mandiant
GRU: Rise of the (Telegram) MinIOns https://www.mandiant.com/resources/blog/gru-rise-telegram-minions
26/09/2022 10:52:59
QRCode
archive.org
thumbnail

Multiple self-proclaimed hacktivist groups are conducting attacks in support of Russian interests.

Mandiant EN 2022 Telegram GRU Russia-Ukraine-war hacktivist Russia Analysis GRU
page 2 / 3
4497 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio