Cyberveilleby Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
14 résultats taggé mandiant  ✕
Move, Patch, Get Out the Way: 2022 Zero-Day Exploitation Continues at an Elevated Pace https://www.mandiant.com/resources/blog/zero-days-exploited-2022
22/03/2023 08:02:20
QRCode
archive.org
thumbnail
  • Mandiant tracked 55 zero-day vulnerabilities that we judge were exploited in 2022. Although this count is lower than the record-breaking 81 zero-days exploited in 2021, it still represents almost triple the number from 2020.
  • Chinese state-sponsored cyber espionage groups exploited more zero-days than other cyber espionage actors in 2022, which is consistent with previous years.
  • We identified four zero-day vulnerabilities exploited by financially motivated threat actors. 75% of these instances appear to be linked to ransomware operations.
  • Products from Microsoft, Google, and Apple made up the majority of zero-day vulnerabilities in 2022, consistent with previous years. The most exploited product types were operating systems (OS) (19), followed by browsers (11), security, IT, and network management products (10), and mobile OS (6).
mandiant EN 2022 2023 zero-day zero-days vulnerabilities exploited review
Fortinet Zero-Day and Custom Malware Used by Suspected Chinese Actor in Espionage Operation https://www.mandiant.com/resources/blog/fortinet-malware-ecosystem
17/03/2023 21:06:14
QRCode
archive.org
thumbnail

A suspected Chinese actor used a zero-day vulnerability in FortiOS and custom malware for espionage.

mandiant EN 2023 zero-day FortiOS China malware Suspected
Welcome to Goot Camp: Tracking the Evolution of GOOTLOADER Operations https://www.mandiant.com/resources/blog/tracking-evolution-gootloader-operations
31/01/2023 22:54:57
QRCode
archive.org
thumbnail

We have been seeing notable changes to TTPs used in GOOTLOADER operations since 2022.

mandiant EN 2023 GOOTLOADER 2022 TTPs Operations
From RM3 to LDR4: URSNIF Leaves Banking Fraud Behind https://www.mandiant.com/resources/blog/rm3-ldr4-ursnif-banking-fraud
21/10/2022 21:32:38
QRCode
archive.org
thumbnail

A new variant of the URSNIF malware, first observed in June 2022, marks an important milestone for the tool. Unlike previous iterations of URSNIF, this new variant, dubbed LDR4, is not a banker, but a generic backdoor (similar to the short-lived SAIGON variant), which may have been purposely built to enable operations like ransomware and data theft extortion. This is a significant shift from the malware’s original purpose to enable banking fraud, but is consistent with the broader threat landscape.

mandiant EN 2022 URSNIF backdoor Banking malware Gozi CUTWAIL spam
The Fresh Phish Market: Behind the Scenes of the Caffeine Phishing-as-a-Service Platform https://www.mandiant.com/resources/blog/caffeine-phishing-service-platform
11/10/2022 08:42:18
QRCode
archive.org
thumbnail

Bad actors are using a shared Phishing-as-a-Service platform called “Caffeine”.

mandiant EN 2022 Caffeine Phishing-as-a-Service Platform
Bad VIB(E)s Part One: Investigating Novel Malware Persistence Within ESXi Hypervisors | Mandiant https://www.mandiant.com/resources/blog/esxi-hypervisors-malware-persistence
03/10/2022 20:11:54
QRCode
archive.org
thumbnail

Earlier this year, Mandiant identified a novel malware ecosystem impacting VMware ESXi, Linux vCenter servers, and Windows virtual machines that enables a threat actor to take the following actions:

1) Maintain persistent administrative access to the hypervisor
2) Send commands to the hypervisor that will be routed to the guest VM for execution
3) Transfer files between the ESXi hypervisor and guest machines running beneath it
4) Tamper with logging services on the hypervisor

mandiant EN 2022 esxi hypervisors malware BadVIB(E)s 0-day
Mystery Hackers Are ‘Hyperjacking’ Targets for Insidious Spying https://www.wired.com/story/hyperjacking-vmware-mandiant/
01/10/2022 01:07:10
QRCode
archive.org
thumbnail

For decades, security researchers warned about techniques for hijacking virtualization software. Now one group has put them into practice.

wired 2022 EN hacking virtualization Hyperjacking malware Blue-Pill Mandiant
GRU: Rise of the (Telegram) MinIOns https://www.mandiant.com/resources/blog/gru-rise-telegram-minions
26/09/2022 10:52:59
QRCode
archive.org
thumbnail

Multiple self-proclaimed hacktivist groups are conducting attacks in support of Russian interests.

Mandiant EN 2022 Telegram GRU Russia-Ukraine-war hacktivist Russia Analysis GRU
Likely Iranian Threat Actor Conducts Politically Motivated Disruptive Activity Against Albanian Government Organizations https://www.mandiant.com/resources/blog/likely-iranian-threat-actor-conducts-politically-motivated-disruptive-activity-against
11/09/2022 10:49:17
QRCode
archive.org
thumbnail

Mandiant attributes the ransomware attack against the Albanian government network in July of 2022 to an Iranian threat actor.

Mandiant EN 2022 report Albania Iran ransomware ROADSWEEP CHIMNEYSWEEP Attribution
Mandiant Finds Possible Link Between Kremlin, Pro-Russian ‘Hacktivists’ https://www.bnnbloomberg.ca/mandiant-finds-possible-link-between-kremlin-pro-russian-hacktivists-1.1785468
03/07/2022 00:44:38
QRCode
archive.org
thumbnail

US officials and allies have warned about attacks from XakNet and related groups.

bnnbloomberg EN 2022 XakNet attacks Russia-Ukraine-war russia Kremlin Mandiant
The IO Offensive: Information Operations Surrounding the Russian Invasion of Ukraine https://www.mandiant.com/resources/information-operations-surrounding-ukraine
21/05/2022 22:51:07
QRCode
archive.org
thumbnail

New Mandiant research detailing the various IO activities seen by nation-state actors, resulting from the Russian invasion of Ukraine.

mandiant EN 2022 Information Operations russia-ukraine-war research IO activities cyberwar
UNC3524: Eye Spy on Your Email https://www.mandiant.com/resources/unc3524-eye-spy-email
03/05/2022 17:16:56
QRCode
archive.org
thumbnail

We introduce UNC3524, a newly discovered suspected espionage threat actor targeting corporate emails.

Mandiant EN 2022 Email espionage corporate emails QUIETEXIT
Zero Tolerance: More Zero-Days Exploited in 2021 Than Ever Before https://www.mandiant.com/resources/zero-days-exploited-2021
24/04/2022 21:47:50
QRCode
archive.org
thumbnail

We identified 80 zero-days exploited in the wild in 2021, more than we've seen in any year.

mandiant 2022 EN 0-days Review year
China-backed APT41 compromised ‘at least’ six US state governments https://techcrunch.com/2022/03/08/apt41-state-governments/
09/03/2022 08:47:52
QRCode
archive.org
thumbnail

The prolific China APT41 hacking group, known for carrying out espionage in parallel with financially motivated operations, has compromised multiple U.S. state government networks, according to cybersecurity giant Mandiant. The group — seemingly undeterred by U.S. indictments against five APT41 members in 2020 — conducted a months-long campaign during which it targeted and successfully breached […]

china cyberwarfare java log4j log4shell malware mandiant russia sql ukraine US APT41 web-application zero-day
1185 links
Shaarli - Le gestionnaire de marque-pages personnel, minimaliste, et sans base de données par la communauté Shaarli - Theme by kalvn - Curated by Decio