Advertisement
Top

Tag: cyber-espionage


Hacker, Threats & Malware

Chinese Hackers Targeted International Aerospace Firms for Years

October 18, 2019

Via: Security Week

Chinese state-sponsored hackers conducted cyber-espionage operations targeting various aerospace-related firms for years in an effort to help the county’s advancements in this sector, Crowdstrike reports. The identified hacking operation started in January 2010, just after the state-owned enterprise Commercial Aircraft […]


Network security

4 Practical Measures to Improve Election Security Now

September 12, 2018

Via: Dark Reading

It’s more critical than ever for states to protect our democratic system and voting infrastructure from foreign cyber espionage. In the past, a midterm election season would pass without much fanfare. These have been torpid affairs with low voter turnout […]


Malware, Virus & Malware

Terdot Banking Trojan Could Act as Cyber-Espionage Tool

November 17, 2017

Via: Security Week

The Terdot banking Trojan packs information-stealing capabilities that could easily turn it into a cyber-espionage tool, Bitdefender says in a new report. Highly customized and sophisticated, Terdot is based on the source code of ZeuS, which leaked online in 2011. […]


Hacker, Malware

Iranian Hackers Target Aerospace, Energy Companies

September 20, 2017

Via: Security Week

A cyber espionage group linked by security researchers to the Iranian government has been observed targeting aerospace and energy organizations in the United States, Saudi Arabia and South Korea. The threat actor, tracked by FireEye as APT33, is believed to […]


Cyber-crime, Privacy protection

New ESET research uncovers Gazer, the stealthy backdoor that spies on embassies

September 4, 2017

Via: We Live Security

Security researchers at ESET have released new research today into the activities of the notorious Turla cyberespionage group, and specifically a previously undocumented backdoor that has been used to spy on consulates and embassies worldwide. ESET’s research team are the […]


Mobile security, Virus & Malware

Targeted Spyware Apps for Android Eradicated by Google

July 28, 2017

Via: Hot for Security

Google’s Android Security has found and blocked a series of targeted spyware apps, part of the Lipizzan malware family, believed to have been developed for cyber espionage. Although the apps seemed to have a benign behavior at first, a second […]


Malware, Virus & Malware

Over 600 Malware Samples Linked to Chinese Cyberspy Group

July 25, 2017

Via: Security Week

A China-linked cyber espionage group tracked by security firms as Lotus Blossom, Elise, Esile and Spring Dragon has used more than 600 malware samples in its attacks over the past years, according to Kaspersky Lab. Spring Dragon has been around […]


Network security

Cyber espionage topping the list of largest security concerns

March 16, 2017

Via: Help Net Security

20 percent of global organizations rank cyber espionage as the most serious threat to their business, with 26 percent struggling to keep up with the rapidly evolving threat landscape. In addition, one in five U.S. organizations have suffered a cyber […]


Vulnerabilities

Company Crown Jewels for Sale: How Espionage as a Service Affects Enterprises

November 29, 2016

Via: TrendMicro Blog

While most enterprises are becoming more aware of threats like ransomware and DDoS attacks, very few know that they are also at risk of economic espionage; much less of associated tools like espionage-as-a-service offerings that attackers can easily avail of […]


Malware

Shakti Trojan: Technical Analysis

August 18, 2016

Via: Malwarebytes

Recently, we took a look at the interesting Trojan found by Bleeping Computer. Our small investigation on its background and possible attribution has led us to the conclusion that this threat is in reality not new – probably it has […]


Cyber-crime, Hacker

Guccifer 2.0 leaks personal data of nearly 200 Congressional Democrats

August 16, 2016

Via: Security Affairs

The hack to the US Presidential election is becoming even more mysterious, while security experts are blaming the Russia for the cyber espionage, a strange figure claims the responsibility for the security breach. He is Guccifer 2.0, an alleged lone […]


Cyber warfare

ProjectSauron: top level cyber-espionage platform covertly extracts encrypted government comms

August 9, 2016

Via: Securelist

Over the last few years, the number of “APT-related” incidents described in the media has grown significantly. For many of these, though, the designation “APT”, indicating an “Advanced Persistent Threat”, is usually an exaggeration. With some notable exceptions, few of […]


Cyber-crime

Attack Attempt Numbers Down, But PoS Malware & Angler Up in Q3

November 18, 2015

Via: Dark Reading

Politically motivated cyber-espionage groups also hard at work between July and September, according to Trend Micro. Although Trend Micro has seen a decline in the number of threats since 2012 — trending nearly 20 percent down — point-of-sale attacks are […]


Cyber-crime

Fake LinkedIn profiles, ‘convincing’ network linked to Iran-based group

October 7, 2015

Via: cyber-crime

The Counter Threat Unit (CTU), the Dell SecureWorks research team, uncovered an initiative by an Iran-based threat group it dubbed #threat group 2889, to create a network of fake #linkedin profiles for “obtaining confidential #information they can use for cyber […]


Malware

Winnti group’s attack platform is based on decade old malware

October 7, 2015

Via: malware

Kaspersky Lab experts tracking the activity of the ####winnti group have discovered an active threat based on a 2006 #bootkit installer. The threat, which they name HDRoot after the original tool’s name HDD Rootkit, is a universal #platform for a […]


Cyber-crime

Russian spy gang hijacking satellite links to pilfer data

September 9, 2015

Via: cyber-crime

Researchers from Kaspersky Labs disclosed this morning that advanced threat actors have found an insidious solution for the constant seizure and takedown of their domains and command-and-control (C&C) servers by ISPs and law enforcement agencies – the use of #satellite-based […]