Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 1 / 3
46 résultats taggé Mandiant  ✕
Defending Against UNC3944: Cybercrime Hardening Guidance from the Frontlines https://cloud.google.com/blog/topics/threat-intelligence/unc3944-proactive-hardening-recommendations?hl=en
14/05/2025 11:32:02
QRCode
archive.org
thumbnail

UNC3944, which overlaps with public reporting on Scattered Spider, is a financially-motivated threat actor characterized by its persistent use of social engineering and brazen communications with victims. In early operations, UNC3944 largely targeted telecommunications-related organizations to support SIM swap operations. However, after shifting to ransomware and data theft extortion in early 2023, they impacted organizations in a broader range of industries. Since then, we have regularly observed UNC3944 conduct waves of targeting against a specific sector, such as financial services organizations in late 2023 and food services in May 2024. Notably, UNC3944 has also previously targeted prominent brands, possibly in an attempt to gain prestige and increased attention by news media.

Google Threat Intelligence Group (GTIG) observed a decline in UNC3944 activity after 2024 law enforcement actions against individuals allegedly associated with the group. Threat actors will often temporarily halt or significantly curtail operations after an arrest, possibly to reduce law enforcement attention, rebuild capabilities and/or partnerships, or shift to new tooling to evade detection. UNC3944’s existing ties to a broader community of threat actors could potentially help them recover from law enforcement actions more quickly.

Recent public reporting has suggested that threat actors used tactics consistent with Scattered Spider to target a UK retail organization and deploy DragonForce ransomware. Subsequent reporting by BBC News indicates that actors associated with DragonForce claimed responsibility for attempted attacks at multiple UK retailers. Notably, the operators of DragonForce ransomware recently claimed control of RansomHub, a ransomware-as-a-service (RaaS) that seemingly ceased operations in March of this year. UNC3944 was a RansomHub affiliate in 2024, after the ALPHV (aka Blackcat) RaaS shut down. While GTIG has not independently confirmed the involvement of UNC3944 or the DragonForce RaaS, over the past few years, retail organizations have been increasingly posted on tracked data leak sites (DLS) used by extortion actors to pressure victims and/or leak stolen victim data. Retail organizations accounted for 11 percent of DLS victims in 2025 thus far, up from about 8.5 percent in 2024 and 6 percent in 2022 and 2023. It is plausible that threat actors including UNC3944 view retail organizations as attractive targets, given that they typically possess large quantities of personally identifiable information (PII) and financial data. Further, these companies may be more likely to pay a ransom demand if a ransomware attack impacts their ability to process financial transactions.

Mandiant EN 20245 ScatteredSpider UK Defending UNC3944 Guidance
M-Trends 2025: Data, Insights, and Recommendations From the Frontlines https://cloud.google.com/blog/topics/threat-intelligence/m-trends-2025/?hl=en
25/04/2025 09:41:54
QRCode
archive.org
thumbnail

M-Trends 2025 data is based on more than 450,000 hours of Mandiant Consulting investigations. The metrics are based on investigations of targeted attack activity conducted between Jan. 1, 2024 and Dec. 31, 2024. Key findings in M-Trends 2025 include:

  • 55% of threat groups active in 2024 were financially motivated, which marks a steady increase, and 8% of threat groups were motivated by espionage.

  • Exploits continue to be the most common initial infection vector (33%), and for the first time stolen credentials rose to the second most common in 2024 (16%).

  • The top targeted industries include financial (17.4%), business and professional services (11.1%), high tech (10.6%), government (9.5%), and healthcare (9.3%).

  • Global median dwell time rose to 11 days from 10 days in 2023. Global median dwell time was 26 days when external entities notified, 5 days when adversaries notified (notably in ransomware cases), and 10 days when organizations discovered malicious activity internally.

M-Trends 2025 dives deep into the aforementioned infostealer, cloud, and unsecured data repository trends, and several other topics, including:

  • Democratic People's Republic of Korea deploying citizens as remote IT contractors, using false identities to generate revenue and fund national interests.

  • Iran-nexus threat actors ramping up cyber operations in 2024, notably targeting Israeli entities and using a variety of methods to improve intrusion success.

  • Attackers targeting cloud-based stores of centralized authority, such as single sign-on portals, to gain broad access.

  • Increased targeting of Web3 technologies such as cryptocurrencies and blockchains for theft, money laundering, and financing illicit activities.

Mandiant 2025 trends M-Trends Data statistcs 2024
Ivanti Connect Secure VPN Targeted in New Zero-Day Exploitation https://cloud.google.com/blog/topics/threat-intelligence/ivanti-connect-secure-vpn-zero-day/?hl=en
09/01/2025 08:50:08
QRCode
archive.org
thumbnail

Zero-day exploitation of Ivanti Connect Secure VPN vulnerabilities since as far back as December 2024.

On Wednesday, Jan. 8, 2025, Ivanti disclosed two vulnerabilities, CVE-2025-0282 and CVE-2025-0283, impacting Ivanti Connect Secure (“ICS”) VPN appliances. Mandiant has identified zero-day exploitation of CVE-2025-0282 in the wild beginning mid-December 2024. CVE-2025-0282 is an unauthenticated stack-based buffer overflow. Successful exploitation could result in unauthenticated remote code execution, leading to potential downstream compromise of a victim network.

Mandiant EN 2025 CVE-2025-0282 CVE-2025-0283 IoC exploitation analysis postexploitation Ivanti
Seeing Through a GLASSBRIDGE: Understanding the Digital Marketing Ecosystem Spreading Pro-PRC Influence Operations https://cloud.google.com/blog/topics/threat-intelligence/glassbridge-pro-prc-influence-operations/?hl=en
22/11/2024 14:05:56
QRCode
archive.org
thumbnail

GLASSBRIDGE is an umbrella group of four different companies that operate networks of inauthentic news sites and newswire services.

Mandiant EN 2024 GLASSBRIDGE fake news newswire services Haixun fake-news China
How Low Can You Go? An Analysis of 2023 Time-to-Exploit Trends https://cloud.google.com/blog/topics/threat-intelligence/time-to-exploit-trends-2023?hl=en
23/10/2024 11:01:54
QRCode
archive.org
thumbnail

Mandiant analyzed 138 vulnerabilities that were disclosed in 2023 and that we tracked as exploited in the wild.

Mandiant EN 2024 Time-to-exploit trends
How the FBI and Mandiant caught a 'serial hacker' who tried to fake his own death https://techcrunch.com/2024/10/01/how-the-fbi-and-mandiant-caught-a-serial-hacker-who-tried-to-fake-his-own-death/
06/10/2024 23:10:23
QRCode
archive.org
thumbnail

Jesse Kipf was a prolific hacker who sold access to systems he hacked, had contacts with a notorious cybercrime gang, and tried to use his hacking skills to get off the grid for good.

techcrunch EN 2024 hacker FBI Mandiant Jesse-Kipf busted GhostMarket09 FreeRadical
A Measure of Motive: How Attackers Weaponize Digital Analytics Tools | Google Cloud Blog https://cloud.google.com/blog/topics/threat-intelligence/how-attackers-weaponize-digital-analytics-tools?hl=en
03/10/2024 21:33:30
QRCode
archive.org
thumbnail

Digital analytics tools are useful, but can also be used for malicious purposes. Digital analytics tools are vital components of the vast domain that is modern cyberspace. From system administrators managing traffic load balancers to marketers and advertisers working to deliver relevant content to their brand’s biggest fan base, tools like link shorteners, location trackers, CAPTCHAs, and digital advertising platforms each play their part in making information universally accessible and useful to all.

Mandiant EN 2024 Attackers Weaponize Digital Analytics UNC1189 link-shortner ma.sk
Staying a Step Ahead: Mitigating the DPRK IT Worker Threat https://cloud.google.com/blog/topics/threat-intelligence/mitigating-dprk-it-worker-threat/?hl=en
24/09/2024 08:37:56
QRCode
archive.org
thumbnail

North Korea's IT workforce presents a persistent and escalating cyber threat.

Mandiant EN 2024 fake workforce DPRK North-Korea UNC5267
An Offer You Can Refuse: UNC2970 Backdoor Deployment Using Trojanized PDF Reader https://cloud.google.com/blog/topics/threat-intelligence/unc2970-backdoor-trojanized-pdf-reader/?hl=en
17/09/2024 16:34:58
QRCode
archive.org
thumbnail

UNC2970 is a cyber espionage group suspected to have a North Korea nexus.

Mandiant 2024 UNC2970 Backdoor PDF PDF-Reader North North-Korea
Black Basta ransomware switches to more evasive custom malware https://www.bleepingcomputer.com/news/security/black-basta-ransomware-switches-to-more-evasive-custom-malware/
03/08/2024 21:04:49
QRCode
archive.org
thumbnail

The Black Basta ransomware gang has shown resilience and an ability to adapt to a constantly shifting space, using new custom tools and tactics to evade detection and spread throughout a network.

bleepingcomputer EN 2024 BlackBasta Initial-Access Malware Ransomware mandiant UNC4393
UNC4393 Goes Gently into the SILENTNIGHT https://cloud.google.com/blog/topics/threat-intelligence/unc4393-goes-gently-into-silentnight/?hl=en
03/08/2024 21:04:00
QRCode
archive.org
thumbnail

In mid-2022, Mandiant's Managed Defense detected multiple intrusions involving QAKBOT, leading to the deployment of BEACON coupled with other pre-ransomware indicators. This marked Mandiant's initial identification of UNC4393, the primary user of BASTA ransomware. Mandiant has responded to over 40 separate UNC4393 intrusions across 20 different industry verticals. While healthcare organizations have not traditionally been a focus for UNC4393, several breaches in the industry this year indicate a possible expansion of their interests. However, this represents only a fraction of the cluster's victims, with the Black Basta data leak site purporting over 500 victims since inception.

Over the course of this blog post, Mandiant will detail the evolution of UNC4393's operational tactics and malware usage throughout its active lifespan, with a focus on the period following the QAKBOT botnet takedown. We will highlight the cluster's transition from readily available tools to custom malware development as well as its evolving reliance on access brokers and diversification of initial access techniques.

Mandiant EN 2024 QAKBOT UNC4393 BlackBasta SILENTNIGHT UNC4393
APT41 Has Arisen From the DUST https://cloud.google.com/blog/topics/threat-intelligence/apt41-arisen-from-dust?hl=en
19/07/2024 11:03:04
QRCode
archive.org
thumbnail
  • In collaboration with Google’s Threat Analysis Group (TAG), Mandiant has observed a sustained campaign by the advanced persistent threat group APT41 targeting and successfully compromising multiple organizations operating within the global shipping and logistics, media and entertainment, technology, and automotive sectors. The majority of organizations were operating in Italy, Spain, Taiwan, Thailand, Turkey, and the United Kingdom.
  • APT41 successfully infiltrated and maintained prolonged, unauthorized access to numerous victims' networks since 2023, enabling them to extract sensitive data over an extended period.
  • APT41 used a combination of ANTSWORD and BLUEBEAM web shells for the execution of DUSTPAN to execute BEACON backdoor for command-and-control communication. Later in the intrusion, APT41 leveraged DUSTTRAP, which would lead to hands-on keyboard activity. APT41 used publicly available tools SQLULDR2 for copying data from databases and PINEGROVE to exfiltrate data to Microsoft OneDrive
Mandiant EN 2024 APT41 Italy Spain Taiwan Thailand Turkey, UK dustpan BEACON DUSTTRAP
UNC3944 Targets SaaS Applications https://cloud.google.com/blog/topics/threat-intelligence/unc3944-targets-saas-applications?hl=en
19/06/2024 10:47:01
QRCode
archive.org
thumbnail

UNC3944 is a financially motivated threat group that carries significant overlap with public reporting of "0ktapus," "Octo Tempest," "Scatter Swine," and "Scattered Spider" and has been observed adapting its tactics to include data theft from software-as-a-service (SaaS) applications to attacker-owned cloud storage objects (using cloud synchronization tools), persistence mechanisms against virtualization platforms, and lateral movement via SaaS permissions abuse. Active since at least May 2022, UNC3944 has leveraged underground communities like Telegram to acquire tools, services, and support to enhance their operations.

Mandiant EN 2024 UNC3944 SaaS Applications Scattered-Spider TTPs
UNC5537 Targets Snowflake Customer Instances for Data Theft and Extortion https://cloud.google.com/blog/topics/threat-intelligence/unc5537-snowflake-data-theft-extortion?hl=en
11/06/2024 08:43:35
QRCode
archive.org
thumbnail

A campaign targeting Snowflake customer database instances with the intent of data theft and extortion.

Mandiant EN 2024 UNC5537 Snowflake report
Mandiant says hackers stole a 'significant volume of data' from Snowflake customers https://techcrunch.com/2024/06/10/mandiant-hackers-snowflake-stole-significant-volume-data-customers/
11/06/2024 06:43:43
QRCode
archive.org
thumbnail

The security firm said the attacks targeting Snowflake customers is "ongoing," suggesting the number of affected companies may rise.

techcrunch EN 2024 Mandiant Snowflake customers
Global attacker median dwell time continues to fall https://www.helpnetsecurity.com/2024/04/24/2023-attacker-dwell-time/
29/04/2024 20:36:55
QRCode
archive.org
thumbnail

The global attacker median dwell time continued trending downwards in 2023, and is now 10 days (from 16 days in the previous year).

helpnetsecurity EN 2024 M-Trends median dwell-time detection Mandiant
Unearthing APT44: Russia’s Notorious Cyber Sabotage Unit Sandworm https://cloud.google.com/blog/topics/threat-intelligence/apt44-unearthing-sandworm?hl=en
18/04/2024 07:10:04
QRCode
archive.org
thumbnail

APT44 is a threat actor that is actively engaged in the full spectrum of espionage, attack, and influence operations.

Mandiant EN 2024 APT44 Threat-Intelligence Sandworm Russia google attribution FROZENBARENTS
Google: Spyware vendors behind 50% of zero-days exploited in 2023 https://www.bleepingcomputer.com/news/security/google-spyware-vendors-behind-50-percent-of-zero-days-exploited-in-2023/
27/03/2024 14:04:52
QRCode
archive.org
thumbnail

Google's Threat Analysis Group (TAG) and Google subsidiary Mandiant said they've observed a significant increase in the number of zero-day vulnerabilities exploited in attacks in 2023, many of them linked to spyware vendors and their clients.

bleepingcomputer EN 2024 Google Google-TAG Mandiant Spyware Zero-Day 2023
APT29 Uses WINELOADER to Target German Political Parties | Mandiant https://www.mandiant.com/resources/blog/apt29-wineloader-german-political-parties
25/03/2024 09:14:30
QRCode
archive.org
thumbnail

APT29 used a new backdoor variant publicly tracked as WINELOADER to target German political parties.

mandiant EN 2024 report APT29 backdoor WINELOADER German Political Parties Germany
Evolution of UNC4990: Uncovering USB Malware's Hidden Depths https://www.mandiant.com/resources/blog/unc4990-evolution-usb-malware
31/01/2024 17:36:21
QRCode
archive.org
thumbnail

UNC4990 uses USB devices for initial infection, and is likely motivated by financial gain.

mandiant EN 2024 UNC4990 USB malware
page 1 / 3
4344 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio