article thumbnail

Experts found rogue devices, including hidden cellular radios, in Chinese-made power inverters used worldwide

Security Affairs

The discovery raises fears China may have installed covert malware in critical energy infrastructure across the US and Europe, enabling remote attacks during conflicts. The DOE said it assesses risks but faces challenges due to manufacturers’ poor disclosure. ” reported Reuters.

article thumbnail

Protecting Oil and Gas Industry Infrastructure: Strategies for Resilience

SecureWorld News

To ensure energy security and economic stability, protecting the infrastructure is essential. A report from 2023 revealed that 67% of energy and utility companies faced ransomware attacks, with many incidents exploiting unpatched vulnerabilities.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

PerfektBlue Bluetooth attack allows hacking infotainment systems of Mercedes, Volkswagen, and Skoda

Security Affairs

It supports both Classic and Low Energy modes, is hardware-agnostic, and includes various standard Bluetooth profiles. By early June, PCA had confirmed that the vulnerabilities affected several vehicle models from an undisclosed original equipment manufacturer (OEM), whose security team was promptly notified.

article thumbnail

IT threat evolution Q3 2024

SecureList

The malware utilizes cloud resources for its C2 (command and control) servers, which it accesses via APIs using authentication tokens. Interestingly, Twelve shares infrastructure, utilities and TTPs (Tactics, Techniques and Procedures) with the DARKSTAR ransomware group (formerly known as Shadow or COMET).

article thumbnail

2025 Supply Chain Threat Landscape: AI, APIs, and the Weakest Link

SecureWorld News

Manufacturing and logistics firms, increasingly digitized and AI-driven, are acutely at risk: state-aligned hackers are "infiltrating the digital arteries of commerce" from ports to payment systems. Attackers are utilizing machine learning to rapidly identify vulnerabilities in complex supply chain networks and launch attacks at scale.

article thumbnail

Head Mare and Twelve join forces to attack Russian entities

SecureList

Additionally, Head Mare attacks utilized command-and-control (C2) servers exclusively linked to Twelve prior to these incidents. Anti-detection techniques Head Mare continued to use the Masquerading technique (T1655), naming utility executables like standard operating system files. doc" --include "*.docx" pdf" --include "*.xls"

article thumbnail

Zanubis in motion: Tracing the active evolution of the Android banking malware

SecureList

This included the contact list, the list of installed applications, and various device identifiers, such as the manufacturer, model, and fingerprint. However, in this new campaign, we have identified two new Peruvian entities being spoofed: a company in the energy sector and a bank that was not previously abused.