article thumbnail

Trusted relationship attacks: trust, but verify

SecureList

But along with the advantages, such as saved time and resources, delegating non-core tasks creates new challenges in terms of information security. Most often, communication between the service provider and the client takes place via VPN connections and Remote Desktop Protocol (RDP) services.

VPN 89
article thumbnail

North Korean APT group Kimsuky allegedly hacked South Korea’s atomic research agency KAERI

Security Affairs

North Korea-linked APT group Kimsuky allegedly breached South Korea’s atomic research agency KAERI by exploiting a VPN vulnerability. A KAERI spokesperson revealed that threat actors exploited a vulnerability in a virtual private network (VPN) server to gain access to the network of the institute. ” reported The Record.

Hacking 139
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Russia-linked Sandworm APT compromised 11 Ukrainian telecommunications providers

Security Affairs

’ The CERT-UA also reported that the state-sponsored hackers used compromised VPN accounts that weren’t protected by multi-factor authentication. Authentication data collected by POEMGATE can be used for lateral movement and other malicious activities on the compromised networks. “Note (!)

article thumbnail

How Companies Need to Treat User Data and Manage Their Partners

Security Affairs

Most of them relate to safeguarding data from misuse and reassuring that all procedures abide by the active regulations. Data Storage: Evaluates the risks around the vendor’s data storage and data retention capabilities to understand how effective they are in keeping sensitive data safe and secure.

article thumbnail

Monitoring the dark web to identify threats to energy sector organizations

Security Affairs

However, the most proactive security teams can also use the data collected from the dark web to create hypotheses for determining what threat hunts to conduct. What if our VPN had a vulnerability and an attacker leveraged that to gain credentials for a privileged user in R&D?

article thumbnail

EvilProxy Phishing-As-A-Service With MFA Bypass Emerged In Dark Web

Security Affairs

Being frank – the bad actors did a great job in terms of the service usability, and configurability of new campaigns, traffic flows, and data collection. The portal of EvilProxy contains multiple tutorials and interactive videos regarding the use of the service and configuration tips.

article thumbnail

Ransomware Revival: Troldesh becomes a leader by the number of attacks

Security Affairs

CERT-GIB’s report is based on data collected and analyzed by the Threat Detection System (TDS) Polygon as part of operations to prevent and detect threats distributed online in H1 2019 in more than 60 countries. To bypass antivirus systems, hackers send out malicious emails in non-working hours with delayed activation. Dangerous email.