article thumbnail

Picus Threat Library Is Updated for Flagpro Malware of BlackTech Group

Security Boulevard

Picus Labs has updated the Picus Threat Library with new attack methods for Flagpro malware of BlackTech. The APT group was first observed in 2010 and they have been active since. Flagpro malware was recently discovered by NTTSecurity and the malware is attributed to BlackTech [1]. BlackTech APT group. Initial Access.

Malware 122
article thumbnail

Crooks target US universities with malware used by nation-state actors

Security Affairs

Several US universities and colleges were targeted in phishing attacks aimed at delivering malware previously used by China-linked APT groups. Hupigon is a remote access Trojan (RAT) that has been active since at least 2006, it was first detected by FireEye in 2010. SecurityAffairs – US universities, phishing).

Malware 100
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Crooks target US universities with malware used by nation-state actors

Security Affairs

Several US universities and colleges were targeted in phishing attacks aimed at delivering malware previously used by China-linked APT groups. Hupigon is a remote access Trojan (RAT) that has been active since at least 2006, it was first detected by FireEye in 2010. SecurityAffairs – US universities, phishing).

Malware 84
article thumbnail

Full(z) House Magecart group mix phishing and MiTM in its attacks

Security Affairs

A group under the Magecart umbrella adopted a new tactic that leverages on MiTM and phishing attacks to target sites using external payment processors. Security firms have monitored the activities of a dozen groups at least since 2010. The name Fullz House comes from two different attack techniques, the phishing, and the web skimming.

article thumbnail

The Olympics: a timeline of scams, hacks, and malware

Malwarebytes

All of a sudden we have infectious email attachments, and compromised third-party sites serving up malware. 2010 Vancouver. Phishing and bogus domains remained a strong contender for taking the scammer gold medal, with ATM carding grabbing a runner-up spot. Wherever you looked, there was a threat sprinting into view.

Scams 137
article thumbnail

Microsoft seized 42 domains used by the China-linked APT15 cyberespionage group

Security Affairs

APT15 has been active since at least 2010, it conducted cyber espionage campaigns against targets worldwide in several industries, including defense, high tech, energy, government, aerospace, and manufacturing. “The Microsoft Digital Crimes Unit (DCU) has disrupted the activities of a China-based hacking group that we call Nickel.

VPN 123
article thumbnail

Dragon Breath APT uses double-dip DLL sideloading strategy

Security Affairs

Most of the victims are Chinese-speaking Windows users engaged in online gambling, the APT group relies on Telegram to distribute the malware. How the user first encountered the site, whether through phishing or SEO poisoning or some other method, is beyond the scope of this investigation.” ” concludes the post.

Malware 87