Experts Warn of Hacking Group Targeting Aviation and Defense Sectors

Experts Warn of Hacking Group Targeting Aviation and Defense Sectors

Entities in the aviation, aerospace, transportation, manufacturing, and defense industries have been targeted by a persistent threat group since at least 2017 as part of a string of spear-phishing campaigns mounted to deliver a variety of remote access trojans (RATs) on compromised systems. The use of commodity malware such as AsyncRAT and NetWire, among others, has led enterprise security firm Proofpoint to a “cybercriminal threat actor” codenamed TA2541 that employs “broad targeting with high volume…

Read More

Hackers Using New Malware Packer DTPacker to Avoid Analysis, Detection

Hackers Using New Malware Packer DTPacker to Avoid Analysis, Detection

A previously undocumented malware packer named DTPacker has been observed distributing multiple remote access trojans (RATs) and information stealers such as Agent Tesla, Ave Maria, AsyncRAT, and FormBook to plunder information and facilitate follow-on attacks. “The malware uses multiple obfuscation techniques to evade antivirus, sandboxing, and analysis,” enterprise security company Proofpoint said in an analysis published Monday. “It is likely distributed on underground forums.” The .NET-based commodity malware has been associated with dozens of campaigns…

Read More

Securing remote work for holiday travelers

Securing remote work for holiday travelers

Securing remote work for holiday travelers | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy…

Read More

Microsoft Details Building Blocks of Widely Active Qakbot Banking Trojan

Microsoft Details Building Blocks of Widely Active Qakbot Banking Trojan

Infection chains associated with the multi-purpose Qakbot malware have been broken down into “distinct building blocks,” an effort that Microsoft said will help to proactively detect and block the threat in an effective manner. The Microsoft 365 Defender Threat Intelligence Team dubbed Qakbot a “customizable chameleon that adapts to suit the needs of the multiple threat actor groups that utilize it.” Qakbot is believed to be the creation of a financially motivated cybercriminal threat group…

Read More

A New Variant of FlawedGrace Spreading Through Mass Email Campaigns

A New Variant of FlawedGrace Spreading Through Mass Email Campaigns

Cybersecurity researchers on Tuesday took the wraps off a mass volume email attack staged by a prolific cybercriminal gang affecting a wide range of industries, with one of its region-specific operations notably targeting Germany and Austria. Enterprise security firm Proofpoint tied the malware campaign with high confidence to TA505, which is the name assigned to the financially motivated threat group that’s been active in the cybercrime business since at least 2014, and is behind the…

Read More

Cyberattacks top list of focuses for business leaders

Cyberattacks top list of focuses for business leaders

Cyberattacks top list of focuses for business leaders This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy closing…

Read More

Hackers posed as flirtatious UK aerobics instructor while targeting US defense contractor’s employee

Hackers posed as flirtatious UK aerobics instructor while targeting US defense contractor’s employee

Cybersecurity researchers said that hackers with ties to the Iranian government targeted U.S. defense contractors in attempts to install malware, including by posing as a United Kingdom-based aerobics instructor.  Security software firm Proofpoint said in a Wednesday report that researchers had identified “a years-long social engineering and targeted malware campaign by the Iranian-state aligned threat actor TA456,” also known as “Tortoiseshell.”  The California-based cybersecurity firm said that “TA456 built a relationship across corporate and personal communication platforms with…

Read More

Paying that ransom request could land you in legal trouble for sanctions violations

Paying that ransom request could land you in legal trouble for sanctions violations

Paying that ransom request could land you in legal trouble for sanctions violations | 2020-12-16 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie…

Read More

The 2020 Cyber-Espionage Report pulls seven years of data to determine threat actors, motives and actions

The 2020 Cyber-Espionage Report pulls seven years of data to determine threat actors, motives and actions

The 2020 Cyber-Espionage Report pulls seven years of data to determine threat actors, motives and actions | 2020-11-18 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated…

Read More

Avoid social engineering attacks and protect employees

Avoid social engineering attacks and protect employees

Avoid social engineering attacks and protect employees | 2020-11-11 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More
1 2 3 4 5