Remove tags spear-phishing
article thumbnail

Google TAG warns of Russia-linked APT groups targeting Ukraine

Security Affairs

The researchers from Google TAG are warning of Russia-linked threat actors targeting Ukraine with phishing campaigns. Russia-linked threat actors launched large-volume phishing campaigns against hundreds of users in Ukraine to gather intelligence and aimed at spreading disinformation, states Google’s Threat Analysis Group (TAG).

article thumbnail

China-linked APT Curious Gorge targeted Russian govt agencies

Security Affairs

China-linked Curious Gorge APT is targeting Russian government agencies, Google Threat Analysis Group (TAG) warns. Google Threat Analysis Group (TAG) reported that an APT group linked to China’s People’s Liberation Army Strategic Support Force (PLA SSF), tracked as Curious Gorge , is targeting Russian government agencies.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

North Korea-linked Zinc group posed as Samsung recruiters to target security firms

Security Affairs

North Korea-linked threat actors posed as Samsung recruiters in a spear-phishing campaign aimed at employees at South Korean security firms. Google TAG researchers reported that the same group, tracked as Zinc ,” also targeted security researchers in past campaigns. ” reads the Google Threat Horizons report. eXplorer.

Malware 124
article thumbnail

Meet Exotic Lily, access broker for ransomware and other malware peddlers

Malwarebytes

The Google Threat Analysis Group (TAG) has shared their observations about a group of cybercriminals called Exotic Lily. Among these interested parties TAG found the Conti and Diavol ransomware groups. From the TAG blog we can learn that Exotic Lily was very much specialized. Initial access broker. Exotic Lily.

article thumbnail

HTML Smuggling Techniques on the Rise: Microsoft

eSecurity Planet

The researchers said they had seen Nobelium using HTML smuggling in a spear-phishing campaign in May, and more recently, observed it being used to deliver the banking Trojan Mekotio and the AsyncRAT/MJRAT and Trickbot malware used by attackers to get control of targeted devices and deliver such malware as ransomware. Trickbot Attacks.

Firewall 121
article thumbnail

A “Naver”-ending game of Lazarus APT

Security Boulevard

In 2021, the main attack vector used by this threat actor was credential phishing attacks through emails, posing as Naver, the popular South Korean search engine and web portal. Some details about this campaign were published in this Korean blog, however they did not perform the threat attribution. Spear phishing emails distribution.

article thumbnail

Google warns some users that FancyBear’s been prowling around

Malwarebytes

Some 14,000 people have been notified about a spear phish attempt looking to compromise accounts and access their files. He goes into more details in this thread: TAG sent a above average batch of government-backed security warnings yesterday. Google has more information on this type of warning over on its security blog.