News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

DeathStalker targets forex and cryptocurrency market

APT actor DeathStalker is targeting companies in the forex and cryptocurrency market. The evasive tech and stealth "VileRAT" toolset is distributed via spear phishing. Companies in Germany are also affected by the attacks. Threat actor DeathStalker has updated its tech and stealth evasion “VileRAT” toolset to attack cryptocurrency and currency exchange businesses, recent Kaspersky analysis shows. The attacked organizations are located in Bulgaria, Cyprus, Germany, Kuwait, Malta, United Arab Emirates, Russia and the Grenadines. Hack-for-Hire APT Actor DeathStalker is a hack-for-hire APT actor whose activities Kaspersky has been tracking since 2018. So far he had...

Read more

EU financial company attacked with EvilNum malware
EU financial company attacked with EvilNum malware

Proofpoint's threat research team has observed that the hacker group, dubbed TA4563 by the company, is using the EvilNum malware to attack various European financial and investment firms. EvilNum is a backdoor used to steal data or download additional malware payloads can be used. The most recently observed campaigns by the group exclusively targeted companies from the decentralized finance sector (Decentralized Finance: DeFi). Previously, however, organizations involved in the foreign exchange business or trading in cryptocurrencies also came into the crosshairs of the attackers. DeathStalker or EvilNum at Work As part of its investigations, Proofpoint was able to…

Read more

DeathStalker attacks German users
Kaspersky_news

APT actor DeathStalker attacks users in Germany and Switzerland. Target of the actor: companies in the financial and legal sector. New backdoor “PowerPepper” uses various obfuscation techniques. Advanced persistent threat (APT) actor DeathStalker is now believed to be offering hacking-for-hire services to steal confidential business information from companies in the financial and legal sectors. Kaspersky experts have now spotted new activity from the actor and discovered a new malware implantation and delivery tactic: the PowerPepper backdoor uses DNS over HTTPS as a communication channel to hide the communication behind legitimate control server name queries. In addition, PowerPepper uses various obfuscation techniques such as steganography. Especially SMEs in…

Read more