Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 3 / 11
203 résultats taggé russia  ✕
Exclusive: Hegseth orders Cyber Command to stand down on Russia planning https://therecord.media/hegseth-orders-cyber-command-stand-down-russia-planning
01/03/2025 08:17:37
QRCode
archive.org
thumbnail

The secretary of Defense has ordered U.S. Cyber Command to stand down from all planning against Russia, including offensive digital actions, sources tell Recorded Future News.

therecord.media EN 2025 Russia CISA US stand-down
Trump administration retreats in fight against Russian cyber threats https://www.theguardian.com/us-news/2025/feb/28/trump-russia-hacking-cyber-security
01/03/2025 08:17:20
QRCode
archive.org
thumbnail

Recent incidents indicate US is no longer characterizing Russia as a cybersecurity threat, marking a radical departure: ‘Putin is on the inside now’

theguardian EN 2025 Trump US Russia CISA threat
Signals of Trouble: Multiple Russia-Aligned Threat Actors Actively Targeting Signal Messenger https://cloud.google.com/blog/topics/threat-intelligence/russia-targeting-signal-messenger?hl=en
26/02/2025 11:06:58
QRCode
archive.org
thumbnail

Google Threat Intelligence Group (GTIG) has observed increasing efforts from several Russia state-aligned threat actors to compromise Signal Messenger accounts used by individuals of interest to Russia's intelligence services. While this emerging operational interest has likely been sparked by wartime demands to gain access to sensitive government and military communications in the context of Russia's re-invasion of Ukraine, we anticipate the tactics and methods used to target Signal will grow in prevalence in the near-term and proliferate to additional threat actors and regions outside the Ukrainian theater of war.

google EN Signal QRcode GTIG Russia Ukraine Messenger
German election targeted by Russian disinformation, security services warn | The Record from Recorded Future News https://therecord.media/german-election-targeted-by-russian-disinformation
21/02/2025 16:56:11
QRCode
archive.org
thumbnail

Germany’s security services warned on Friday that fake videos circulating online purporting to reveal ballot manipulation in the country’s upcoming federal elections were part of a Russian information operation.

therecord.media EN 2024 Germany disinformation Russia election
Storm-2372 conducts device code phishing campaign https://www.microsoft.com/en-us/security/blog/2025/02/13/storm-2372-conducts-device-code-phishing-campaign/#Update-February-14
16/02/2025 14:34:05
QRCode
archive.org
thumbnail

Microsoft Threat Intelligence Center discovered an active and successful device code phishing campaign by a threat actor we track as Storm-2372. Our ongoing investigation indicates that this campaign has been active since August 2024 with the actor creating lures that resemble messaging app experiences including WhatsApp, Signal, and Microsoft Teams. Storm-2372’s targets during this time have included government, non-governmental organizations (NGOs), information technology (IT) services and technology, defense, telecommunications, health, higher education, and energy/oil and gas in Europe, North America, Africa, and the Middle East. Microsoft assesses with medium confidence that Storm-2372 aligns with Russian interests, victimology, and tradecraft.

microsoft EN 2025 Storm-2372 phishing campaign Russia
Multiple Russian Threat Actors Targeting Microsoft Device Code Authentication https://www.volexity.com/blog/2025/02/13/multiple-russian-threat-actors-targeting-microsoft-device-code-authentication/
14/02/2025 08:28:11
QRCode
archive.org
thumbnail

Starting in mid-January 2025, Volexity identified several social-engineering and spear-phishing campaigns by Russian threat actors aimed at compromising Microsoft 365 (M365) accounts. These attack campaigns were highly targeted and carried out in a variety of ways. The majority of these attacks originated via spear-phishing emails with different themes. In one case, the eventual breach began with highly tailored outreach via Signal.Through its investigations, Volexity discovered that Russian threat actors were impersonating a variety of individuals

volexity EN 2025 Russia spearphishing M365 social-engineering
New UK sanctions target Russian cybercrime network https://www.gov.uk/government/news/new-uk-sanctions-target-russian-cybercrime-network?ref=metacurity.com
11/02/2025 17:16:11
QRCode
archive.org
thumbnail

A key Russian cybercrime syndicate responsible for aiding merciless ransomware attacks around the world has been targeted by new UK sanctions.

gov.uk EN 2025 Russia cybercrime syndicate sanctions LockBit Zservers
How Switzerland is caught up in Russia’s propaganda machine https://www.swissinfo.ch/eng/foreign-affairs/how-switzerland-is-caught-up-in-russias-propaganda-machine/88785511
03/02/2025 12:03:24
QRCode
archive.org
thumbnail

How Russian propaganda challenges Switzerland's neutrality, using disinformation to sway public opinion in the Ukraine war.

swissinfo EN 2025 Switzerland Russia propaganda Ukraine
Norway seizes ship suspected of sabotage, says crew are Russian nationals https://therecord.media/norway-seizes-ship-suspected-sabotage
31/01/2025 16:13:20
QRCode
archive.org
thumbnail

The Silver Dania is the third ship detained in recent weeks over concerns of intentional damage to subsea infrastructure in the Baltic Sea.

therecord.media EN 2025 Norway cable sabotage Russia Baltic Sea
Sweden launches sabotage probe after another data cable damaged in Baltic Sea Europe https://www.france24.com/en/europe/20250126-another-undersea-cable-damaged-in-baltic-sea-latvia-dispatches-warship
27/01/2025 09:27:17
QRCode
archive.org

Another undersea data cable, this time connecting Sweden and Latvia, has been severed in the Baltic Sea, officials from both countries said Sunday. The incident prompted Sweden to launch a criminal probe into the matter and seize a "suspect vessel" vessel headed for Russia.

france24 EN 2025 cable Sweden Latvia Baltic undersea sabotage Russia
How A Large-Scale Russian Botnet Operation Stays Under the Radar https://blogs.infoblox.com/threat-intelligence/one-mikro-typo-how-a-simple-dns-misconfiguration-enables-malware-delivery-by-a-russian-botnet/
26/01/2025 12:15:21
QRCode
archive.org
thumbnail

Russian threat actors combine domain name vulnerabilities with hidden router proxy techniques to scale their attacks while remaining shielded from detection.

infoblox EN 2025 Mikrotik Botnet Russia proxy Large-Scale
Russian ISP confirms Ukrainian hackers "destroyed" its network https://www.bleepingcomputer.com/news/security/russian-isp-confirms-ukrainian-hackers-destroyed-its-network/
09/01/2025 16:38:15
QRCode
archive.org
thumbnail

Russian internet service provider Nodex confirmed on Tuesday that its network was

bleepingcomputer EN 2024 Breach Hacktivism ISP Nodex Russia Ukraine Ukrainian-Cyber-Alliance
Finnish police detain Russian 'ghost fleet' ship crew as cable damage probe continues https://www.euronews.com/my-europe/2025/01/03/police-in-finland-say-eagle-s-crew-detained-as-estlink-2-cable-damage-probe-continues
03/01/2025 12:19:47
QRCode
archive.org

The Eagle S is suspected of damaging the Estlink-2 power cable which runs under the Baltic Sea between Finland and Estonia by dragging its anchor along the seabed on Christmas Day.

Police in Finland say the crew of a Russia-linked tanker suspected of damaging a power cable under the Baltic Sea have been detained indefinitely.

The Eagle S crew consists of 24 people with Finland’s Central Criminal Police imposing movement restrictions on eight.

euronews EN 2025 Finland Russia sabotage cables Balric sea shadow-fleet
Finland identifies seven suspects among crew of alleged Russian 'spy' tanker https://therecord.media/finland-suspects-identified-alleged-russian-spy-ship
31/12/2024 16:59:47
QRCode
archive.org
thumbnail

Seven crew members of the seized ship Eagle S are being treated as suspects as Finland investigates undersea cable sabotage and alleged Russian spying.

therecord.media EN 2024 Finland Russia cable sabotage
Finnish authorities board ship suspected of cutting subsea Internet and power cables https://www.datacenterdynamics.com/en/news/finnish-authorities-board-ship-suspected-of-cutting-subsea-internet-and-power-cables/
27/12/2024 10:50:37
QRCode
archive.org

Four Internet cables cut in latest Baltic Sea incident

datacenterdynamics EN 2024 Finland Baltic cables internet disrupted subsea Russia
Russia is using bitcoin in foreign trade, finance minister says https://www.reuters.com/markets/currencies/russia-is-using-bitcoin-foreign-trade-finance-minister-says-2024-12-25/
26/12/2024 14:37:24
QRCode
archive.org

Russian companies have begun using bitcoin and other digital currencies in international payments following legislative changes that allowed such use in order to counter Western sanctions, Finance Minister Anton Siluanov said on Wednesday.
Sanctions have complicated Russia's trade with its major partners such as China or Turkey, as local banks are extremely cautious with Russia-related transactions to avoid scrutiny from Western regulators.

reuters EN 2024 crypto Russia currencies sanctions trade
Inside Operation Destabilise: How a ransomware investigation linked Russian money laundering and street-level drug dealing https://therecord.media/operation-destabilise-money-laundering-investigation-uk-nca
23/12/2024 13:44:58
QRCode
archive.org
thumbnail

U.K. investigators tell the story of how examining a cybercrime group's extortion funds helped to unravel a money-laundering network reaching from the illegal drug trade to Moscow's elite.

therecord.media EN 2024 Operation-Destabilise ransomware Russia UK cybercrime money-laundering
DHS Says China, Russia, Iran, and Israel Are Spying on People in US with SS7 https://www.404media.co/dhs-says-china-russia-iran-and-israel-are-spying-on-people-in-us-with-ss7/
20/12/2024 09:11:28
QRCode
archive.org
thumbnail

The Department of Homeland Security knows which countries SS7 attacks are primarily originating from. Others include countries in Europe, Africa, and the Middle East.

404media EN 2024 SS7 China Russia Iran Israel spy US attacks telco
Russian Spies Jumped From One Network to Another Via Wi-Fi in an Unprecedented Hack | WIRED https://www.wired.com/story/russia-gru-apt28-wifi-daisy-chain-breach/
22/11/2024 14:02:52
QRCode
archive.org
thumbnail

In a first, Russia's APT28 hacking group appears to have remotely breached the Wi-Fi of an espionage target by hijacking a laptop in another building across the street.

wired EN 2024 russia hacking Wi-Fi espionage hijacking APT28
PROSPERO & Proton66: Tracing Uncovering the links between bulletproof networks https://www.intrinsec.com/prospero-proton66-tracing-uncovering-the-links-between-bulletproof-networks/
21/11/2024 17:17:03
QRCode
archive.org
  • The Russian autonomous system PROSPERO (AS200593) could be linked with a high level of confidence to Proton66 (AS198953), another Russian AS, that we believe to be connected to the bulletproof services named ‘SecureHost‘ and ‘BEARHOST‘. We notably observed that both network’s configurations are almost identical in terms of peering agreements and their respective share of loads throughout time.
  • Amongst the activities shared by the two networks, we noticed that both GootLoader and SpyNote malwares recently changed their infrastructure of command-and-control servers and phishing pages from to Proton66. Additionally, the domains hosting the phishing pages deploying SpyNote were hosted on either one of the two AS and had already been used in previous campaigns delivering revoked AnyDesk and LiveChat versions for both Windows and Mac.
  • Regarding the other malicious activities found on PROSPERO’s IPs, we found that throughout September, multiple SMS spam campaigns targeting citizens from various countries were leading to phishing domains hosted on PROSPERO and Proton66. While most phishing templates were usurping bank login pages to steal credit card details, we also noticed that some of them were used to deploy android spywares such as Coper (a.k.a. Octo).
  • SocGholish, another initial access broker (IAB) that we found to be hosting a major part of its infrastructure on Proton66, continues to leverage this autonomous system to host fingerprinting scripts contained on the websites it infects. Along SocGholish, we found out that FakeBat, another loader that infects systems through compromised websites, was using the same IPs to host both screening and redirection script
intrinsec EN 2024 AS200593 AS198953 PROSPERO GootLoader SpyNote Russia bulletproof BEARHOST SocGholish
page 3 / 11
4943 links
Shaarli - Le gestionnaire de marque-pages personnel, minimaliste, et sans base de données par la communauté Shaarli - Theme by kalvn