article thumbnail

GTPDOOR: The Shape-Shifting Threat Lurking in Telco Networks

Penetration Testing

A new Linux-based malware, christened GTPDOOR, has emerged with a cunning strategy to infiltrate the heart of telecommunication networks – the GRX (GPRS Roaming Exchange).

article thumbnail

Podcast Episode 122: will 5G increase Internet of Things Risk?

The Security Ledger

Telecommunications firms like to talk up all the great things that so-called 5G cellular networks will bring to smart phones. Telecommunications firms like to talk up all the great things that so-called 5G cellular networks will bring to smart phones. But what new kinds of Internet of Things use cases may become possible?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Lyceum APT made the headlines with attacks in Middle East

Security Affairs

reported that Hexane is targeting organizations in the oil and gas industry and telecommunication providers. Using compromised accounts, the threat actors send spearphishing emails with malicious Excel attachments to deliver the DanBot malware, which subsequently deploys post-intrusion tools.” Security experts at Dragos Inc.

DNS 81
article thumbnail

OilRig APT group: the evolution of attack techniques over time

Security Affairs

The group has targeted a variety of industries, including financial, government, energy, chemical, and telecommunications, and has largely focused its operations within the Middle East. T1388) , from group_b to group_d time frames OilRig used real Compromised User Accountsextracted by Malware (rif. Exploit Technique Over Time.

article thumbnail

Scanning for Flaws, Scoring for Security

Krebs on Security

Naturally, combining external scans with internal vulnerability probes and penetration testing engagements can provide organizations with a much more holistic picture of their security posture. It took Equifax two weeks to fix that expired cert. ARE YOU EXPERIANSED?

article thumbnail

Guarding Against Solorigate TTPs

eSecurity Planet

This update touches on the newly detected malware , attack vectors to guard against, and why the targeting of security vendors is a critical development in cybersecurity. Before jumping into the technical details regarding each new malware detected and proper safeguards, here is a brief look at the events to date: Sep 2019.

article thumbnail

Cyber Security Awareness and Risk Management

Spinone

The IT landscape’s complexity requires the deployment of Privileged Identity Management technologies, given the increasing sophistication of modern attacks via malware and ungated entries. You will create cyber awareness among your staff, as well as users, partners, customers.