News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Bitdefender exposes military cyber espionage
Bitdefender_News

Bitdefender Labs uncover military cyber espionage: The Naikon hacker group uses side-loading techniques and powerful backdoors for espionage and data exfiltration. During an analysis of the misuse of vulnerable legitimate software, Bitdefender Labs uncovered long-running cyber espionage by the well-known APT group Naikon. Naikon has been active for more than a decade. The Chinese-speaking group focuses on high-level targets such as government agencies and military organizations. The evidence gathered suggests that the campaign aimed at espionage and data exfiltration. Such attacks, which follow the example in one of the most cyber-dangerous regions currently - Southeast Asia - are also in ...

Read more

APT group Lazarus attacks defense companies
Kaspersky_news

APT group Lazarus has defense companies in its sights. Malware 'ThreatNeedle' also attacks restricted networks without internet access. Kaspersky researchers have identified a new, previously unknown campaign by the advanced threat actor Lazarus. Since the beginning of 2020, this has been aimed against companies in the defense industry with the custom backdoor 'ThreatNeedle'. The backdoor moves laterally through infected networks and collects confidential information. Lazarus can steal data from both IT and restricted networks. Lazarus group active since 2009 Lazarus is a very productive threat actor that has been active since at least 2009. The group is for ...

Read more

APT group attacks Mongolian authorities
Eset_News

ESET announces: Operation StealthyTrident: espionage attack on Mongolian government agencies. Installation programs and the update system of frequently used software were provided with malicious code. Around 430 authorities in the Mongolian government have fallen victim to an APT group. ESET researchers found that the hackers compromised a chat software called Able Desktop, which is used in a business management suite popular in Mongolia. In a first step, the cyber criminals manipulated the installation program and later also the update system and used it to spread malware. The attacker's goal was to target sensitive ...

Read more

DeathStalker attacks German users
Kaspersky_news

APT actor DeathStalker attacks users in Germany and Switzerland. Target of the actor: companies in the financial and legal sector. New backdoor “PowerPepper” uses various obfuscation techniques. Advanced persistent threat (APT) actor DeathStalker is now believed to be offering hacking-for-hire services to steal confidential business information from companies in the financial and legal sectors. Kaspersky experts have now spotted new activity from the actor and discovered a new malware implantation and delivery tactic: the PowerPepper backdoor uses DNS over HTTPS as a communication channel to hide the communication behind legitimate control server name queries. In addition, PowerPepper uses various obfuscation techniques such as steganography. Especially SMEs in…

Read more

AV-TEST: new test procedures for ATP attacks
AV TEST News

Strategic attacks require new test procedures: this is part of the new test concept published by AV-Test, the independent antivirus test laboratory based in Magdeburg. As the threat level increases, companies are increasingly expanding their IT security through specialized defense mechanisms to ward off strategic and targeted attacks. At the same time, further strategies to avert danger are being developed. But how good is the defense performance of new products in the area of ​​endpoint protection and endpoint detection & response against APT attacks? The AV-TEST Institute gives an insight into new test procedures for the professional assessment of such solutions. New danger situations require new test structures On the homepage you will find ...

Read more

APT forecasts 2021: changed attack strategies
APT forecast 2021

APT forecasts 2021: Kaspersky experts expect changed attack strategies and new vulnerabilities. In the focus of APT actors: 5G, network applications and multi-level attacks. The Kaspersky experts present their predictions in the area of ​​Advanced Persistent Threats (APT) for the year 2021. Due to the increased attack surface, structural and strategic changes will occur with regard to targeted attacks. APT actors will probably target network applications, increasingly look for 5G vulnerabilities and carry out multi-stage attacks. However, there is also a bright spot: there will be actions against cybercriminal activities, such as the sale of zero days. The annual forecasts were made on ...

Read more

Cyber ​​espionage: APT attack on Asian authorities
Bitdefender_News

How cyber espionage works: Bitdefender analyzes APT attack on Southeast Asian authorities. Bitdefender's security researchers took a closer look at a complex and targeted chain of attacks by organized APT hackers. They were able to trace a cyber espionage process in detail. Specifically, it concerns attacks on government organizations in Southeast Asia, which have presumably been carried out since 2018. The perpetrators allegedly wanted to divert information about national security interests as well as other sensitive data and engage in industrial espionage. In a whitepaper, the Bitdefender specialists present an in-depth analysis of the techniques used and their interaction, as well as a chronological breakdown of the attack chain. 200 systems ...

Read more

Lazarus group manipulates security software
Eset_News

ESET researchers analyze the latest activity of the infamous APT group: Lazarus group manipulates security software. ESET researchers uncovered a campaign by the Lazarus group targeting South Korean internet users. The attackers use malware that infects the software supply chain through unusual manipulation. To do this, the hackers misuse a legitimate South Korean security software called WIZVERA VeraPort and digital certificates. In South Korea, it is common practice for users to be asked to install additional security software when they visit government or internet banking websites. The ESET researchers have now published their detailed analysis on WeliveSecurity. "WIZVERA ...

Read more

Hacker group stole government secrets
Hacker group espionage hackers APT

The hacker group XDSpy stole government secrets in Europe for years. The previously unnoticed group often used spear phishing related to COVID-19 for their cyber espionage. ESET researchers unmasked a cyber spy ring that was previously able to operate unnoticed. According to the European security manufacturer, the APT group has been active since 2011 and has specialized in the theft of sensitive government documents in Eastern Europe and the Balkans. The targets are primarily government agencies, including military facilities and foreign ministries, as well as a few companies. The hacker gang, known as XDSpy by ESET, has remained largely undetected for nine years, which is rare….

Read more

Blackmailers threaten DDoS attacks
Eset_News

Blackmailers threaten even though they have not yet had any DDoS attacks or (data) hostages: Blackmailers threaten financial companies and retailers with DDoS attacks if they do not pay. The blackmailers pose as one of the most notorious APT groups in the world in order to intimidate their victims. In the past few weeks, cyber criminals have blackmailed organizations around the world with threats of distributed denial-of-service (DDoS) attacks, demanding thousands of dollars in bitcoins. The attackers targeted companies from the finance, travel and e-commerce sectors around the world. The ransom demands affect companies in the UK, the United States and ...

Read more