Remove Blog Remove Cybercrime Remove Security Defenses Remove VPN
article thumbnail

Iran-linked MERCURY APT behind destructive attacks on hybrid environments

Security Affairs

.” DEV-1084 presented itself as cybercrime group likely as an attempt to hide its real motivation of a nation-state actor. Both groups used MULLVAD VPN. The attackers were able to interfere with security tools using Group Policy Objects (GPO). DEV-1084 used Rport and a customized version of Ligolo.

article thumbnail

Who’s Behind the GandCrab Ransomware?

Krebs on Security

But GandCrab far eclipsed the success of competing ransomware affiliate programs largely because its authors worked assiduously to update the malware so that it could evade antivirus and other security defenses. ru , a site which marketed dedicated Web servers to individuals involved in various cybercrime projects. Vpn-service[.]us

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Ransomware Groups Look for Inside Help

eSecurity Planet

“Historically, ransomware has been delivered via email attachments or, more recently, using direct network access obtained through things like unsecure VPN accounts for software vulnerabilities,” Crane Hassold, director of threat intelligence at Abnormal Security, wrote in a blog post.

article thumbnail

APT trends report Q1 2021

SecureList

On February 24, the National Security Defense Council of Ukraine (NSDC) publicly warned that a threat actor had exploited a national documents circulation system (SEI EB) to distribute malicious documents to Ukrainian public authorities. In November and December 2020, two public blog posts were published about this campaign.

Malware 142