Remove state-of-security ransomware-characteristics-attack-chains-recent-campaigns
article thumbnail

Unmasking Crypto Scams: The Team Effort Behind the Con

Digital Shadows

It has links to multiple types of cyber crime, including ransomware, carding, phishing, and malware development. To conduct attacks specifically linked to cryptocurrency, threat actors must usually cooperate within a web of associates—just like any other area of cyber crime.

Scams 40
article thumbnail

APT trends report Q3 2021

SecureList

The SolarWinds incident reported last December stood out because of the extreme carefulness of the attackers and the high-profile nature of their victims. The evidence suggests that the threat actor behind the attack, DarkHalo (aka Nobelium), had spent six months inside OrionIT’s networks to perfect their attack.

Malware 140
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

APT trends report Q2 2021

SecureList

Investigating the recent Microsoft Exchange vulnerabilities we and our colleagues from AMR found an attacker deploying a previously unknown backdoor, “FourteenHi”, in a campaign that we dubbed ExCone, active since mid-March. These attacks were attributed to Nobelium and APT29 by Microsoft and Volexity respectively.

Malware 140
article thumbnail

How security professionals will rise to the challenge of cyber defense in 2022

CyberSecurity Insiders

However, with this has come adversaries who have grown more confident with attacking high level targets, such as the Colonial Pipeline and other critical infrastructure operations. We have seen firsthand that it takes more than an individual task force to combat ransomware and other related threats such as phishing, insider threats and more.