Remove russian-hackers-are-using-4-new-malware-families
article thumbnail

Russian Hackers Are UsingĀ  4 New Malware Families

Heimadal Security

The Microsoft Threat Intelligence Center (MSTIC) disclosed the fact that the hacking group APT29, also known as Nobelium, compromised the Contact account for USAID, by using four new malware families. The post Russian Hackers Are Using 4 New Malware Families appeared first on Heimdal Security Blog.

Malware 124
article thumbnail

Network Footprints of Gamaredon Group

Cisco Security

As the Russian-Ukrainian war continues over conventional warfare, cybersecurity professionals witnessed their domain turning into a real frontier. Threat Actors in the Russian-Ukrainian Conflict. Some of the groups and malware related to the conflict are described in Table 1: Threat Actor. Gamaredon [7]. Pteranodon [8].

Malware 109
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

A free Decryptor tool for GandCrab Ransomware released

Security Affairs

Victims of the latest variants of the GandCrab ransomware can now decrypt their files for free using a free decryptor tool released on the the NoMoreRansom website. of the ransomware, as well as versions 1 and 4. . ” read a blog post published by BitDefender. The tool works with versions 5 to 5.2

article thumbnail

ā€˜Unpackingā€™ technical attribution and challenges for ensuring stability in cyberspace

SecureList

When reports of a cyberattack appear in the headlines, questions abound regarding who launched it and why. Even if an attacker has what are to it perfectly rational reasons for conducting such an attack, these reasons are often known only to them. Our key discussion points include: How is technical attribution carried out?

article thumbnail

The Hacker Mind Podcast: Hacking Real World Criminals Online

ForAllSecure

Find out what Daniel looks for and how he does digital forensics using social media and other open source resources. How do you use digital to find a real world criminal? And they did, relatively quickly, using something known as Open Source Intelligence, or OSINT. I'm CEO of Shadow Dragon, and I'm just an old school hacker guy.

Hacking 40