article thumbnail

Russia-linked APT28 targets govt bodies with fake NATO training docs

Security Affairs

Even today, less than half of the known antivirus engines are flagging the infection on VirusTotal , as observed by BleepingComputer: The APT28 group (aka Fancy Bear , Pawn Storm , Sofacy Group , Sednit , and STRONTIUM ) has been active since at least 2007 and it has targeted governments, militaries, and security organizations worldwide.

Antivirus 109
article thumbnail

Microsoft: North Korea-linked Zinc APT targets security experts

Security Affairs

This threat actor has been active since at least 2009, possibly as early as 2007, and it was involved in both cyber espionage campaigns and sabotage activities aimed to destroy data and disrupt systems. Attackers also employed an encrypted Chrome password-stealer hosted on ZINC domain [link]. .

Malware 116
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Portnox Cloud: NAC Product Review

eSecurity Planet

Founded in 2007, Por t nox began selling a software-based NAC solution to be used in local networks. For example, encryption keys, administrator passwords, and other critical information are stored in the Azure Key Vault in FIPS 140-2 Level 2-validated hardware security modules (HSMs).

IoT 98
article thumbnail

Adventures in Contacting the Russian FSB

Krebs on Security

In the process of doing so, I encountered a small snag: The FSB’s website said in order to communicate with them securely, I needed to download and install an encryption and virtual private networking (VPN) appliance that is flagged by at least 20 antivirus products as malware. biz, circa 2007. Image: Wikipedia.

Antivirus 299
article thumbnail

[SI-LAB] FlawedAmmyy Leveraging Undetected XLM Macros as an Infection Vehicle

Security Affairs

This technology is stored in the Workbook OLE stream in Excel 97-2003 format which makes it very difficult to detect and parse by antivirus (AV) engines. doc and.xlm) to evade antivirus detection and bypass spam filters as well. This leads to XLM macros not being well known to the public. Figure 25: Customer-based AV solutions.

Malware 85
article thumbnail

IT threat evolution Q3 2021

SecureList

The attack is estimated to have resulted in the encryption of files belonging to around 60 Kaseya customers using the on-premises version of the platform. the developers used a third-party ad module that includes the Triada Trojan (detected by Kaspersky’s mobile antivirus as Trojan.AndroidOS.Triada.ef). In version 16.80.0

Malware 90
article thumbnail

Top Network Detection & Response (NDR) Solutions

eSecurity Planet

Whereas older solutions like antivirus, firewalls, and endpoint detection and response (EDR) have long focused on threats at the network perimeter, the intent of NDR is to monitor and act on malicious threats within organization networks using artificial intelligence (AI) and machine learning (ML) analysis. ExtraHop Networks. billion in 2016.