News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

OilRig: Hacker group attacks Israeli organizations
Eset_News

The hacking group OilRig, with suspected ties to Iran, has been targeting Israeli manufacturing companies, local government organizations and the healthcare industry for over a year. Researchers at IT security manufacturer ESET have uncovered a campaign by the APT group “OilRig” (also known as APT34, Lyceum, Crambus or Siamesekitten), which has been attacking local government organizations, manufacturing companies and also the healthcare sector in Israel since 2022. OilRig uses legitimate cloud service providers for data exfiltration The criminals, who are believed to be from Iran, are trying to penetrate the networks of Israeli organizations and find and exfiltrate sensitive data. To achieve this, OilRig is using a variety of new...

Read more

Hacker group from Iran with new attack methods
Hacker group from Iran with new attack methods

Security researchers have uncovered a new scam linked to the Phosphorus APT group. This hacking group has a wide range of skills, from ransomware to targeted spear phishing against high-profile individuals. Check Point Research (CPR) reports that they are on the trail of a new hacking campaign. This activity cluster was named Educated Manticore, after the manticore creature from Persian mythology, with which the security researchers want to make it clear from the name which nation they suspect is behind the campaign. Iranian state hacker groups Sergey Shykevich, Threat Group Manager at Check Point Software…

Read more

Hacker group first spies on whether victims are lucrative

Proofpoint security experts have uncovered a new hacker group called TA866, which attacked tens of thousands of companies with malware between October 2022 and January 2023. The activities are aimed in particular at organizations in Germany and the USA. One detail of the TA866 attacks stands out: the cybercriminals first analyze screenshots of their potential victims' IT environments to identify particularly lucrative targets. They only try to infect the victim with a bot or a stealer if they think it is worth further involvement. Attack start with Screentime From October 2022 until…

Read more

Hacker group Polonium uses cloud services for attacks
Eset_News

The hacker group POLONIUM (APT) has attacked targets in Israel with previously unknown backdoors and cyber espionage tools. The group mostly uses cloud services for the attacks. The ESET researchers have dubbed the malware "Creepy". The group is said to be working with Iran. According to the analysis by the researchers of the European IT security manufacturer, the hackers have attacked more than a dozen organizations since at least September 2021. The group's most recent action took place in September 2022. Target industries of this group include engineering, information technology, legal, communications, branding and marketing, media, insurance and social services. Hacker group probably with Iran connections according to...

Read more

Hacker group FIN7 - still elusive

New research from Mandiant reveals that the financially motivated hacking group FIN7 has evolved its operations and is increasingly focusing on ransomware attacks believed to include MAZE, RYUK, DARKSIDE and ALPHV ransomware. Mandiant has now been able to link previous activities by other threat clusters to FIN7. These show that FIN7 has evolved to increase the speed of its operations, broaden the scope of its targets, and possibly even expand its relationships with other ransomware operations in the cybercriminal underground. Key Findings About FIN7 Since 2020, a total of eight previously classified groups of…

Read more

Espionage activities against governments
Eset_News

ESET researchers uncover espionage activities against governments and other targets. Hacker group Gelsemium has targeted high-profile organizations, companies and authorities in East Asia and the Middle East with the Gelsevirine malware. ESET researchers have analyzed several campaigns that they attribute to the cyber espionage group Gelsemium. The experts from the European IT security manufacturer traced the malware Gelsevirine used. During the investigation, the researchers found a new version of the malware. Gelsevirine Targets Governments The victims of their campaigns are in East Asia as well as the Middle East and include governments, religious organizations, electronics manufacturers and universities. So far…

Read more

FIN11 hacker group discovered
Fireeye News

The security specialist Mandiant Threat Intelligence (FireEye) has observed a financially motivated group of hackers and registered it under the new name “FIN11”. The group is responsible for some of the largest and longest-running malware campaigns Mandiant has seen against FIN groups. The financially motivated hackers have recently focused on ransomware and extortion as aggressive ransomware campaigns have grown in popularity among cyber criminals. Dangerous ransomware as a weapon of attack The most important facts about FIN11 and the detailed report can be found below, a summary can be found on the FireEye blog. Matching articles for ...

Read more

Hacker group stole government secrets
Hacker group espionage hackers APT

The hacker group XDSpy stole government secrets in Europe for years. The previously unnoticed group often used spear phishing related to COVID-19 for their cyber espionage. ESET researchers unmasked a cyber spy ring that was previously able to operate unnoticed. According to the European security manufacturer, the APT group has been active since 2011 and has specialized in the theft of sensitive government documents in Eastern Europe and the Balkans. The targets are primarily government agencies, including military facilities and foreign ministries, as well as a few companies. The hacker gang, known as XDSpy by ESET, has remained largely undetected for nine years, which is rare….

Read more