article thumbnail

Long-running surveillance campaigns target Uyghurs with BadBazaar and MOONSHINE spyware

Security Affairs

The threat actors behind the campaigns used two Android spyware to spy on the victims and steal sensitive information. APT15 has been active since at least 2010, it conducted cyber espionage campaigns against targets worldwide in several industries, including defense, high tech, energy, government, aerospace, and manufacturing.

article thumbnail

Pegasus spyware has been here for years. We must stop ignoring it

Malwarebytes

Pegasus is spyware, and spyware is not made to respect privacy. According to NSO Group, its main spyware program is a beneficial tool for investigating and preventing terrorist attacks and maintaining the safety of the public. This was the worst time of my life and yet the killers were spying on me. They have no shame.

Spyware 120
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

OnionPoison: infected Tor Browser installer distributed through popular YouTube channel

SecureList

More importantly, one of the libraries bundled with the malicious Tor Browser is infected with spyware that collects various personal data and sends it to a command and control server. The spyware also provides the functionality to execute shell commands on the victim machine, giving the attacker control over it. 2021-Dec-21 09:44:08.

article thumbnail

Cyber CEO: The History Of Cybercrime, From 1834 To Present

Herjavec Group

They hack into their teacher’s account and leave messages making fun of him. Air Force research facility, discover a password “sniffer” has been installed onto their network, compromising more than 100 user accounts. 2010 — Zeus Trojan Virus — An Eastern European cybercrime ring steals $70 million from U.S.

article thumbnail

APT trends report Q3 2021

SecureList

The first accounts of its activity date back to March last year, in which archives carrying COVID-related decoy file names that contained a malicious executable were described in a tweet by MalwareHunterTeam. Historically, its Windows implant was represented by a single-stage spyware installer.

Malware 143