Remove 2017 Remove Accountability Remove Antivirus Remove Blog
article thumbnail

A Closer Look at the Snatch Data Ransom Group

Krebs on Security

The government says Snatch used a customized ransomware variant notable for rebooting Microsoft Windows devices into Safe Mode — enabling the ransomware to circumvent detection by antivirus or endpoint protection — and then encrypting files when few services are running. ru account and posted as him.

article thumbnail

North Korea-linked Zinc group posed as Samsung recruiters to target security firms

Security Affairs

Attackers used Twitter profiles for sharing links to a blog under their control ( br0vvnn[.]io io ), to share videos of their claimed exploits, and for amplifying and retweeting posts from other accounts under their control.

Malware 130
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Microsoft: North Korea-linked Zinc APT targets security experts

Security Affairs

Microsoft Threat Intelligence Center (MSTIC) attributes this campaign with high confidence to ZINC, a DPRK-affiliated and state-sponsored group, based on observed tradecraft, infrastructure, malware patterns, and account affiliations.” Attackers used Twitter profiles for sharing links to a blog under their control ( br0vvnn[.]io

Malware 119
article thumbnail

SeroXen RAT for sale

CyberSecurity Insiders

This blog was jointly written with Alejandro Prada and Ofer Caspi. It has been historically associated with malicious activity performed by threat actors, APT groups (like in this Mandiant report from 2017), or government attacks (in this report by Unit42 in 2017). in March 2023, which is the most current version.

Malware 117
article thumbnail

Targeted assets: The need for cyber resilient infrastructure

Webroot

How can we prevent a replay of the 2017 attacks against Ukraine’s power grid from happening here? Even private companies like Colonial, until now under less pressure than a public utility to account for compromises, should be invited in. infrastructure cybersecurity? Don’t forget to secure corporate networks, too.

Insurance 113
article thumbnail

The Case for Limiting Your Browser Extensions

Krebs on Security

This compromised extension tries to determine if the person using it is typing content into specific Web forms, such as a blog post editing system like WordPress or Joomla. The malicious link that set off antivirus alarm bells when people tried to visit Blue Shield California downloaded javascript content from a domain called linkojager[.]org.

Insurance 292
article thumbnail

Tracing the Supply Chain Attack on Android

Krebs on Security

An online search for the term “yehuo” reveals an account on the Chinese Software Developer Network which uses that same nickname and references the domain blazefire[.]com. In July 2017, Russian antivirus vendor Dr.Web published research showing that Triada had been installed by default on at least four low-cost Android models.

Mobile 254