article thumbnail

Winnti Group was planning a devastating supply-chain attack against Asian manufacturer

Security Affairs

The Winnti group was first spotted by Kaspersky in 2013, according to the researchers the gang has been active since 2007. The PortReuse backdoor has a modular architecture, experts discovered that its components are separate processes that communicate through named pipes.

article thumbnail

Winnti APT group uses skip-2.0 malware to control Microsoft SQL Servers

Security Affairs

The Winnti group was first spotted by Kaspersky in 2013, according to the researchers the gang has been active since 2007. The PortReuse backdoor has a modular architecture, experts discovered that its components are separate processes that communicate through named pipes.

Malware 46
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Iranian Charming Kitten APT used a new BellaCiao malware in recent wave of attacks

Security Affairs

Microsoft has been tracking the threat actors at least since 2013, but experts believe that the cyberespionage group has been active since at least 2011 targeting journalists and activists in the Middle East, as well as organizations in the United States, and entities in the U.K., Israel, Iraq, and Saudi Arabia.

Malware 97
article thumbnail

Best Network Monitoring Tools for 2022

eSecurity Planet

Founded in 2010 by veteran SaaS and DevOps industry leaders, Datadog specializes in optimizing the service-oriented architecture, helping organizations monitor user journeys and explore service relationships. Catchpoint Features. Administrators can group traffic by container , team, or office and filter data by tag, device, or host.

Marketing 119
article thumbnail

Black Hat USA 2023 NOC: Network Assurance

Cisco Security

XDR (eXtended Detection and Response) Integrations At Black Hat USA 2023, Cisco Secure was the official Mobile Device Management, DNS (Domain Name Service) and Malware Analysis Provider. SCA detected 289 alerts including Suspected Port Abuse, Internal Port Scanner, New Unusual DNS Resolver,and Protocol Violation (Geographic).

article thumbnail

How to Prevent SQL Injection Attacks

eSecurity Planet

The least common of SQL injection attacks, the out-of-band method relies on the database server to make DNS or HTTP requests delivering data to an attacker. . . . In 2013, eSecurityPlanet reported on how attackers exploited Foxit by sending users long URLs that would trigger a stack-based buffer overflow. . Out-of-band.

article thumbnail

APT trends report Q1 2022

SecureList

While we were unable to obtain the same results by analyzing the CERT-UA samples, we subsequently identified a different WhiteBlackCrypt sample matching the WhisperKill architecture and sharing similar code. Janicab was first introduced in 2013 as malware able to run on macOS and Windows operating systems.

Malware 131