News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

APT: TA473 attacks NATO allies, officials and structures
B2B Cyber ​​Security ShortNews

Proofpoint's security experts have uncovered a new cyber campaign that is particularly targeting NATO allies. The TA473 hacker group, an Advanced Persistent Threat (APT) actor, is using an IT vulnerability called "Zimbra vulnerability" (CVE-2022-27926) for its current campaign. The target of their attacks are publicly accessible webmail portals hosted by Zimbra (the Zimbra Collaboration Suite is an e-mail and groupware solution). As part of their activities, the attackers attempt to gain access to e-mails related to the war between Russia and Ukraine from military, governmental and diplomatic organizations in Europe. The APT group TA473 is also…

Read more

Is a new era of ransomware coming?
Is a new era of ransomware coming?

The latest research results show how the business models of cybercriminals can change. Trend Micro publishes a new study that looks at the expected changes in the field of ransomware. The warning: Cyber ​​criminals are expanding into other illegal business models and merging with state actors or organized crime. Threat actors evolve their methods in response to corporate defense strategies, law enforcement successes, and government sanctions. This is made possible, for example, by the scaling of attacks due to increased automation, increased targeting of IoT and cloud environments, as well as improved operational security (OpSec)...

Read more

Hive: After the smashing, the victims hope
Hive: After the smashing, the victims hope

The end of the ransomware group HIVE was also the start of new investigation methods: Infiltration by hacker gangs means that ransom payments are no longer without alternative. The air is getting thinner for APT gangs. A few weeks ago, German and US authorities (Baden-Württemberg police, FBI and Secret Service) in cooperation with other European security authorities smashed the "Hive" hacker network after a joint investigation. A comment by Lothar Geuenich, VP Central Europe / DACH at Check Point. HIVE: Perpetrators fear, victims hope This is a victory that should be celebrated. Because apparently the group had already been affected by ransomware attacks...

Read more

APT report: Chinese threat actors are making Europe unsafe
APT report: Chinese threat actors are making Europe unsafe

The European IT security manufacturer ESET has published its current "APT Activity Report T3 2022". Focus: Chinese hacker groups are active in Europe and Russian hacker groups continue to target Ukraine. Investigative findings on selected Advanced Persistent Threat (APT) groups are regularly summarized in these reports. In the latest issue, which covers the period from September to December 2022, ESET experts present their latest insights into various global hacking campaigns. Groups allied with China have shifted their activities to European countries. Ukraine continues to be targeted by Russian hackers like Sandworm, Callisto or…

Read more

Is HIVE behind the attack on the Potsdam administration?
B2B Cyber ​​Security ShortNews

It is not yet entirely clear whether HIVE is behind the cyber attack on the Potsdam administration. A message from the administration speaks of HIVE and that even after the APT group has been broken up, the systems are still being switched off. The misery does not end for the city administration of Potsdam. Although the IT experts restarted the attacked and then repaired systems in January, they shut everything down again on January 24th. After an expanded virus scanner was activated, there were a large number of automated communication attempts from the state capital's internal network...

Read more

FBI, BKA, Europol smash Hive ransomware network
FBI, BKA, Europol smash Hive ransomware network

The FBI secretly infiltrated the Hive network and, in addition to key servers and decryption keys, even took over the Hive group's leak page on the dark web. In doing so, the FBI, the German BKA, the Baden-Württemberg police and Europol thwarted ransom demands of over 130 million US dollars. The US Department of Justice announced that its month-long disruption campaign against the Hive ransomware group has now borne fruit. The ransomware group was responsible for more than 1.500 victims in over 80 countries. Including hospitals, school districts, financial companies and critical infrastructure (KRITIS). The action was a joint effort by the FBI, the German BKA, the…

Read more

Spyware to monitor Uyghurs
Spyware for surveillance campaigns against Uyghurs

IT security analysts have uncovered two new surveillance spyware programs targeting Uyghurs in mainland China and abroad. One campaign introduced a novel Android monitoring tool Lookout has dubbed BadBazaar, which shares infrastructure with other previously discovered Uyghur-targeted tools. The other tool uses updated variants of a previously publicized tool, MOONSHINE, discovered by Citizen Lab that targeted Tibetan activists in 2019. Although there have been surveillance and detention campaigns against Uyghurs and other Turkish ethnic minorities for years, after…

Read more

Threat Report 2023: Cybercrime as Big Business
Threat Report 2023: Cybercrime as Big Business

Cybercrime is increasingly flourishing as a business model, ransomware and ransomware-as-a-service are innovation drivers and stolen access data are increasingly acting as a cash cow. According to Sophos, the year 2023 also awaits companies in cyber defense. Sophos has published its 2023 Threat Report. Among other things, the report describes a new degree of commercialization within cybercrime, as a result of which low-threshold introductory offers are increasingly available for potential attackers: almost all scenarios can be bought. A booming cybercrime-as-a-service market caters to a criminal audience ranging from the highly tech-savvy to the completely ignorant. The topics of the current Sophos threat…

Read more

Lazarus Group Unleashes Backdoor DTrack on Businesses
Kaspersky_news

Notorious APT actor Lazarus is expanding its attacks and is now targeting companies in Europe, including Germany and Switzerland. The Kaspersky experts were able to identify attacks with the backdoor DTrack on two German chemical processing and manufacturing companies and one on a Swiss chemical processing company. Lazarus has been active since at least 2009 and has been blamed for cyber espionage, cyber sabotage and ransomware attacks. Initially, the group was focused on implementing what appeared to be a geopolitical agenda centered primarily on South Korea….

Read more

Hackers raid diamond wholesalers and steal nothing
Eset_News

For some hackers, the destruction of digital data is more important than theft or blackmail. APT group Agrius has carried out a series of cyberattacks using the Fantasy wiper malware, according to ESET experts. For diamond wholesalers, theft, fraud and ransom demands are part of their daily business threats. However, the fact that cybercriminals are only out to destroy digital information and do not want to make any financial profit surprised the affected gem dealers in Israel as well as the security experts from ESET. They were able to prove that the APT group Agrius had carried out a series of cyber attacks with the "Fantasy" malware, which also…

Read more