News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Hacking and espionage attacks on South Asian governments
B2B Cyber ​​Security ShortNews

ESET researchers analyzed two variants of the yty framework: Gedit and DarkMusical. Their espionage attacks target governments and militaries in South Asia. The main task of the yty malware framework is to collect and exfiltrate data. The hacking group Donot Team (also known as APT-C-35 or SectorE02) has been conducting espionage attacks on embassies, government and military facilities, and foreign ministries for at least two years. According to ESET researchers' analysis, the group's campaigns focused on targets in Bangladesh, Sri Lanka, Pakistan and Nepal. Their diplomatic facilities in Europe, the Middle East and America…

Read more

Russian authorities are said to have broken up the REvil group
B2B Cyber ​​Security ShortNews

As reported by Tageschau.de, the Russian authorities state that they tracked down and smashed the hacker group REvil. Hackers from the REvil group are said to be behind thousands of ransomware attacks, such as on the American IT service provider Kaseya and its 40.000 business customers. As reported by Tageschau.de, the US has asked the Russian authorities whether reports of the hacker group REvil being broken up are true. According to their own statements, Russian investigators have now dissolved the REvil infrastructure. The domestic secret service FSB announced that the illegal activities of the members had been smashed. During searches at 14 places of residence, money and equipment were...

Read more

Hackers organize themselves more and more professionally
Hackers organize themselves more and more professionally

In the course of 2021, hackers have organized their underground ecosystems better and better, so that in the new year 2022 even more professional attack patterns must be expected. According to the security experts at Radware, ransomware groups in particular are increasingly looking for allies among experienced contract hackers. Attacks on MSPs and 5G network operators are also expected. For example, ransomware groups Avaddon, SunCrypt, Ragnar Locker, and Hello Kitty are known to use DDoS attacks to further pressure their victims. "Such groups regularly publish messages hiring experts in areas such as backup technology - not to...

Read more

Hacker: data is very popular in the dark web
Hacker: data is very popular in the dark web

The illegal trade in data on the dark web is flourishing and the anonymous users who show interest in it or even participate are increasing. Stolen data has a long range and rapid dissemination: If data gets into the dark web, it can spread widely. The data sets provided were accessed 24 times within 1100 hours. Social engineering attack tactics such as phishing not only require technical precautionary measures, but also a corresponding risk awareness on the part of the potential victims. Your behavior can prevent greater damage should an attack occur that bypasses technical protective measures. Increased misbelief ...

Read more

Isolated air gap networks for KRITIS are vulnerable 
Eset_News

Even isolated networks for KRITIS are not safe from attacks or data theft. ESET researchers are investigating special malicious programs that target so-called "air gap" networks. Critical and sensitive infrastructures must be particularly well protected against hackers. One possibility is the use of so-called "air gap" networks. These are used, for example, in industrial control systems that manage pipelines and power grids or dial-up or SCADA systems that control nuclear centrifuges, among other things. These systems are not directly connected to the internet. This complete isolation of a device or system from the Internet and other networks should ...

Read more

Log4j alert: Chinese and Iranian government actors attack

It is the most critical vulnerability discovered in years. Countless companies around the world are vulnerable and the situation is developing rapidly. Mandiant has identified that Chinese and Iranian government actors are already exploiting the vulnerability in log4j. Commenting on the latest findings, John Hultquist, VP of Intelligence Analysis at Mandiant, “We know that Chinese and Iranian government actors are exploiting this vulnerability, and we expect other state actors are doing the same or are preparing to do so. We believe these actors will act quickly to gain a foothold in coveted networks. With the…

Read more

How hackers launch their phishing networks

Bait attacks, also known as reconnaissance attacks, are usually emails with very short or empty content. The aim is to check the victim's email accounts. Barracuda Networks' Bait Attack Tips. In view of the increasing professionalization of cyber criminals, companies must be able to ward off all kinds of attacks. However, with extremely elaborate attacks, there is a risk that hackers will succeed in infiltrating the network and moving there unnoticed. In order to use such an emergency for the clarification of the opposite side, it is well known that there are now ...

Read more

Trend Micro exposes cyber mercenary group "Void Balaur"
Trend Micro News

Hackers motivated by espionage and financial interests have targeted more than 2015 companies and private individuals since 3.500. Trend Micro has now exposed the cyber mercenary group "Void Balaur". Trend Micro, one of the world's leading providers of cybersecurity solutions, publishes new research that reveals in detail how a group of hackers attacked at least 3.500 individuals and companies. The victims include human rights activists, journalists, politicians and technical executives in telecommunications companies. Cyber ​​mercenary group Void Balaur “Cyber ​​mercenaries are an unfortunate expression of today's cyber crime,” explains Feike Hacquebord, Senior Threat Researcher at Trend Micro. "Given the high demand ...

Read more

Mandiant classifies ransomware group as FIN12
B2B Cyber ​​Security ShortNews

Last year, the UNC1878 hacking group made headlines after it deliberately and aggressively attacked healthcare facilities with ransomware. Mandiant has upgraded UNC1878 from an "unclassified group" to the category of FIN hackers. A report. Mandiant UNC1878 upgraded from an "unclassified group" to the category of FIN hackers (financially motivated groups) and assigned the designation FIN12. FIN12 was responsible for nearly 20 percent of all ransomware attacks Mandiant responded to last year. The average time to ransom demand is around 2,5 days. This makes FIN12 about twice as fast as ...

Read more

Hacker group spies on governments and organizations in hotels
Eset_News

"FamousSparrow" exploits Microsoft Exchange security holes from March 2021. Hacker group spies on governments and organizations in hotels. A cyber espionage group that has hitherto been inconspicuous has impressively demonstrated how quickly a vulnerability that has become known can be exploited. “FamousSparrow” started its espionage attacks exactly one day after the Microsoft Exchange security holes were published (March 2021). This so-called Advanced Persistent Threat (APT) mainly attacks hotels around the world. But goals in other areas such as governments, international organizations, engineering offices and law firms are now on the agenda. The ESET researchers examined the actions of the hacking group and ...

Read more