Remove Data collection Remove Malware Remove Surveillance Remove Technology
article thumbnail

A chink in the armor of China-based hacking group Nickel

Malwarebytes

Nickel’s techniques vary, but in the end the group’s activity has only one objective, namely to implant stealthy malware for getting into networks, stealing data, and spying on government agencies, think tanks, and human rights organizations. Targets, methods, and techniques. Stay safe, everyone!

Hacking 101
article thumbnail

Microsoft disrupts China-based hacking group Nickel

Malwarebytes

Nickel’s techniques vary, but in the end the group’s activity has only one objective, namely to implant stealthy malware for getting into networks, stealing data, and spying on government agencies, think tanks, and human rights organizations. Targets, methods, and techniques. Stay safe, everyone!

Hacking 79
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Advanced threat predictions for 2024

SecureList

The rise of destructive attacks In December of last year, shortly after we released our predictions for 2023, Russian government agencies were reported to have been targeted by a data wiper called CryWiper. The malware posed as ransomware, demanding money from the victims for “decrypting” their data.

Hacking 109
article thumbnail

The State of Stalkerware in 2023–2024

SecureList

Stalkerware requires physical access to be installed, but our report also looks at a range of remote technology that can be used for nefarious purposes. Not only can the intruder violate their victim’s privacy by monitoring their activities, but they can also use the software to access huge volumes of personal data.

Mobile 84
article thumbnail

Knock, Knock; Who’s There? – IoT Device Identification & Data Integrity Is No Joke

Thales Cloud Protection & Licensing

They all must have unique identifiers and the ability to collect and transfer data over networks to enable monitoring, surveillance, and execution of decisions based on the collected data with little or no human intervention. Protecting the integrity and confidentiality of data collected by all connected devices.

IoT 72
article thumbnail

FinSpy: unseen findings

SecureList

FinSpy, also known as FinFisher or Wingbird , is an infamous surveillance toolset. The Pre-Validator ensures that the victim machine is not used for malware analysis. Each shellcode collects specific system information (e.g. The macOS version of the malware is not as complicated as the Windows one. MacOS Infection.