Remove DNS Remove Government Remove Phishing Remove Spyware
article thumbnail

Russia-linked Gamaredon APT targets Ukrainian authorities with new malware

Security Affairs

Russia-linked threat actor Gamaredon employed new spyware in cyber attacks aimed at public authorities and critical information infrastructure in Ukraine. The government experts pointed out that the threat actor continues to evolve its TTPs to avoid detection. lnk” (“Request of the Security Service of Ukraine 12-1-125 dated 09.01.2023.lnk”).

Malware 87
article thumbnail

Russia-linked InvisiMole APT targets state organizations of Ukraine

Security Affairs

Ukraine CERT (CERT-UA) warns of spear-phishing ??attacks The Government Team for Response to Computer Emergencies of Ukraine (CERT-UA) warns of spear-phishing messages conducted by UAC-0035 group (aka InvisiMole) against Ukrainian state bodies. The messages use an archive named “501_25_103.zip”,

Spyware 83
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Security Affairs newsletter Round 210 – News of the week

Security Affairs

Scranos – A Cross Platform, Rootkit-Enabled Spyware rapidly spreading. Analyzing OilRigs malware that uses DNS Tunneling. Google is going to block logins from embedded browsers against MitM phishing attacks. Hacker broke into super secure French Governments Messaging App Tchap hours after release.

article thumbnail

IT threat evolution in Q2 2023

SecureList

Tomiris called, they want their Turla malware back We first reported Tomiris in September 2021, following our investigation into a DNS hijack against a government organization in the CIS (Commonwealth of Independent States). The attribution of tools used in a cyber-attack can sometimes be a very tricky issue.

Malware 73
article thumbnail

Types of Malware & Best Malware Protection Practices

eSecurity Planet

Attackers often use botnets to send out spam or phishing campaigns to carry out distributed denial of service (DDoS) attacks. Additional features of botnets include spam, ad and click fraud, and spyware. Phishing and Social Engineering. More targeted efforts at specific users or organizations are known as spear phishing.

Malware 105
article thumbnail

IT threat evolution Q3 2023

SecureList

The targets included government, military, critical infrastructure and IT organizations in Ukraine, Romania, Poland, Jordan, Turkey, Italy and Slovakia. However, they included an additional module that constantly monitored the messenger and sent data to the spyware creator’s C2 server. org domain.

Malware 91
article thumbnail

IT threat evolution Q1 2022

SecureList

The group uses various malware families, including Wroba, and attack methods that include phishing, mining, smishing and DNS poisoning. Subsequently, DDoS attacks hit some government websites. One of the things you can do to protect yourself from advanced mobile spyware is to reboot your device on a daily basis.

Phishing 103