article thumbnail

XDSpy APT remained undetected since at least 2011

Security Affairs

Researchers from ESET uncovered the activity of a new APT group, tracked as XDSpy, that has been active since at least 2011. XDSpy is the name used by ESET researchers to track a nation-state actor that has been active since at least 2011. The post XDSpy APT remained undetected since at least 2011 appeared first on Security Affairs.

Malware 137
article thumbnail

Unknown FinSpy Mac and Linux versions found in Egypt

Security Affairs

Since 2011 it was employed in attacks aimed at Human Rights Defenders (HRDs) in many countries, including Bahrain, Ethiopia, UAE, and more. It extracts the binary for the relevant architecture in /tmp/udev2 and executes it. Below the infection chain for the FinSpy for Linux, descrived by the researchers. ” continues the analysis.

Spyware 139
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

DePriMon downloader uses a never seen installation technique

Security Affairs

According to a report published by Symantec in 2017, Longhorn is a North American hacking group that has been active since at least 2011. “ DePriMon is an unusually advanced downloader whose developers have put extra effort into setting up the architecture and crafting the critical components,” ESET concludes.

Malware 103
article thumbnail

Chinese APT Tropic Trooper target air-gapped military Networks in Asia

Security Affairs

The Tropic Trooper APT that has been active at least since 2011, it was first spotted in 2015 by security experts at Trend Micro when it targeted government ministries and heavy industries in Taiwan and the military in the Philippines. “tracert -h 8 8.8.8.8”

article thumbnail

Post-Quantum Cryptography: Lessons Learned from SHA-1 Deprecation

Security Boulevard

SHA-1 was officially deprecated by NIST in 2011 and its usage for digital signatures was prohibited in 2013. Prepare a quantum-safe architecture now. Can the cybersecurity industry learn anything from the problems encountered with the move from the deprecated SHA-1 to the stronger and safer SHA-2 hashing algorithm?

article thumbnail

Cisco to pay $8.6 million fine for selling flawed surveillance technology to the US Gov

Security Affairs

“There was no allegation or evidence that any unauthorized access to customers’ video occurred as a result of the architecture.” The payment settles litigation that had originally been brought in 2011.” ” explained Mark Chandler, Cisco’s Executive Vice President and Chief Legal Officer.

article thumbnail

It’s Too Late for Threat Intelligence Vendors to Ignore IPv6

Webroot

That day came in February 2011, met with a dramatic announcement by the Internet Corporation for Assigned Names and Numbers. Well, it did exist , but was never officially adopted because it used the same 32-bit architecture as its predecessor. That made for just under 4.3 billion possible number combinations under the IPv4 system.