Remove DNS Remove Government Remove Malware Remove Spyware
article thumbnail

Russia-linked Gamaredon APT targets Ukrainian authorities with new malware

Security Affairs

Russia-linked threat actor Gamaredon employed new spyware in cyber attacks aimed at public authorities and critical information infrastructure in Ukraine. The government experts pointed out that the threat actor continues to evolve its TTPs to avoid detection. shop/09.01_otck/quicker[.]rtf.

Malware 88
article thumbnail

Russia-linked InvisiMole APT targets state organizations of Ukraine

Security Affairs

The Government Team for Response to Computer Emergencies of Ukraine (CERT-UA) warns of spear-phishing messages conducted by UAC-0035 group (aka InvisiMole) against Ukrainian state bodies. Ukraine CERT (CERT-UA) warns of spear-phishing ??attacks attacks conducted by UAC-0035 group (aka InvisiMole) on state organizations of Ukraine.

Spyware 83
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Malvertising Is a Cybercrime Heavyweight, Not an Underdog

SecureWorld News

Malvertising acts as a vessel for malware propagation. Scammers and malware operators are increasingly adept at mimicking popular brands in their ad snippets, which makes it problematic for the average user to tell the wheat from the chaff. One of the biggest pitfalls with malvertising is how difficult it can be to detect.

article thumbnail

IT threat evolution in Q2 2023

SecureList

Both infection methods resulted in the same malware (the DeathNote downloader), which uploaded the target’s information and retrieved the next-stage payload at the discretion of the C2 (Command and Control) server. It’s thought that the malware was spread through a vulnerability in the software.

Malware 73
article thumbnail

Canadian Police Raid ‘Orcus RAT’ Author

Krebs on Security

Canadian police last week raided the residence of a Toronto software developer behind “ Orcus RAT ,” a product that’s been marketed on underground forums and used in countless malware attacks since its creation in 2015. government said was used to infect more than a half million computers worldwide. An advertisement for Orcus RAT.

article thumbnail

IT threat evolution Q3 2023

SecureList

The targets included government, military, critical infrastructure and IT organizations in Ukraine, Romania, Poland, Jordan, Turkey, Italy and Slovakia. To exfiltrate data and deliver next-stage malware, the attackers abuse cloud-based data storage, such as Dropbox or Yandex Disk, as well as a temporary file sharing service.

Malware 91
article thumbnail

Security Affairs newsletter Round 210 – News of the week

Security Affairs

Scranos – A Cross Platform, Rootkit-Enabled Spyware rapidly spreading. Analyzing OilRigs malware that uses DNS Tunneling. Hacker broke into super secure French Governments Messaging App Tchap hours after release. Marcus Hutchins pleads guilty to two counts of banking malware creation. Code execution – Evernote.