Tag: espionage
-
Joint Advisory Warns of PRC-Backed Cyber Espionage Targeting Telecom Networks
A joint advisory issued by Australia, Canada, New Zealand, and the U.S. has warned of a broad cyber espionage campaign undertaken by People’s Republic of China (PRC)-affiliated threat actors targeting telecommunications providers.”Identified exploitations or compromises associated with these threat actors’ activity align with existing weaknesses associated with victim infrastructure; no novel First seen on thehackernews.com…
-
BlackBerry Highlights Rising Software Supply Chain Risks in Malaysia
Tags: access, ai, attack, breach, ceo, ciso, communications, compliance, cyber, cyberattack, cybersecurity, data, detection, espionage, finance, framework, government, infrastructure, intelligence, international, Internet, iot, malware, mobile, monitoring, phishing, ransomware, regulation, resilience, risk, skills, software, strategy, supply-chain, threat, tool, training, vulnerabilityIn 2024, BlackBerry unveiled new proprietary research, underscoring the vulnerability of software supply chains in Malaysia and around the world.According to the study, 79% of Malaysian organizations reported cyberattacks or vulnerabilities in their software supply chains during the past 12 months, slightly exceeding the global average of 76%. Alarmingly, 81% of respondents revealed they had…
-
Chinese LIDAR Dominance a Cybersecurity Threat, Warns Think Tank
The Foundation for Defense of Democracies has warned that Chinese-made LIDAR sensors could be weaponized for espionage First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/chinese-lidar-dominance/
-
ElizaRAT Exploits Google, Telegram, Slack Services For C2 Communications
APT36, a Pakistani cyber-espionage group, has recently upgraded its arsenal with ElizaRAT, a sophisticated Windows RAT that, initially detected in 2023, employs advanced evasion tactics and robust C2 capabilities to target Indian government agencies, diplomatic personnel, and military installations. The group leverages multiple platforms, including Windows, Linux, and Android, to broaden its attack surface as…
-
From US to UAE: APT35 Expands Reach in Cyber Espionage
The ThreatBook Research and Response Team has revealed a sophisticated campaign by APT35, also known as Magic Hound or Charming Kitten, targeting the aerospace and semiconductor industries across multiple countries,... First seen on securityonline.info Jump to article: securityonline.info/from-us-to-uae-apt35-expands-reach-in-cyber-espionage/
-
The New Face of Cyber Espionage: Inside the Two-Stage Infection Strategy of China-Linked Threat Actors
First seen on thefinalhop.com Jump to article: www.thefinalhop.com/china-linked-hackers-adopt-sophisticated-two-stage-infection-tactic-to-deploy-deuterbear-rat/
-
ANEL Backdoor Reactivated in Earth Kasha Cyber-Espionage Campaign
In June 2024, Trend Micro identified a new spear-phishing campaign targeting political organizations, research institutions, and think tanks in Japan. This operation, attributed to the cyber-espionage group Earth Kasha, marks... First seen on securityonline.info Jump to article: securityonline.info/anel-backdoor-reactivated-in-earth-kasha-cyber-espionage-campaign/
-
Russian Hackers Target Mozilla, Windows in New Exploit Chain
ESET Discovers Two Major Vulnerabilities Exploited by Russian RomCom Hacking Group. Two vulnerabilities in Mozilla products and Windows are actively exploited by RomCom, a Kremlin-linked cybercriminal group known for targeting businesses and conducting espionage, warn security researchers from Eset. Exploiting the two flaws together enables attackers to execute arbitrary code. First seen on govinfosecurity.com Jump…
-
Salt Typhoon Builds Out Malware Arsenal With GhostSpider
The APT, aka Earth Estries, is one of China’s most effective threat actors, performing espionage for sometimes years on end against telcos, ISPs, and governments before being detected. First seen on darkreading.com Jump to article: www.darkreading.com/application-security/salt-typhoon-malware-arsenal-ghostspider
-
Aggressive Chinese APT Group Targets Governments with New Backdoors
A Trend Micro analysis of Earth Estries found that the Chinese threat actor is using new backdoors to avoid detection during espionage operations First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/chinese-apt-governments-backdoors/
-
Beijing claims it’s found ‘underwater lighthouses’ that its foes use for espionage
Tags: espionageFirst seen on theregister.com Jump to article: www.theregister.com/2024/10/30/china_seabed_surveillance_device_claims/
-
South Asian hackers target Pakistani entities in new espionage campaign
First seen on therecord.media Jump to article: therecord.media/south-asian-hackers-target-pakistan-entities-in-espionage-campaign
-
Russia-linked APT TAG-110 uses targets Europe and Asia
Russia-linked threat actors TAG-110 employed custom malware HATVIBE and CHERRYSPY to target organizations in Asia and Europe. Insikt Group researchers uncovered an ongoing cyber-espionage campaign by Russia-linked threat actor TAG-110 that employed custom malware tools HATVIBE and CHERRYSPY. The campaign primarily targeted government entities, human rights groups, and educational institutions in Central Asia, East Asia,…
-
ISMG Editors: China-Linked Espionage Targets US Telecoms
Also: Highlights from ISMG’s Financial Services Summit and Key Insights on AI Adoption. On the 200th episode of the ISMG Editors’ Panel, the team discussed the major China-linked cyberespionage campaign targeting U.S. telecommunications, highlighted key insights from ISMG’s Financial Services Summit in New York and unpacked the top findings from ISMG’s annual Generative AI Survey.…
-
ISMG Editors: China-Linked Espionage Targets U.S. Telecoms
Also: Highlights from ISMG’s Financial Services Summit and Key Insights on AI Adoption. On the 200th episode of the ISMG Editors’ Panel, the team discussed the major China-linked cyberespionage campaign targeting U.S. telecommunications, highlighted key insights from ISMG’s Financial Services Summit in New York, and unpacked the top findings from ISMG’s annual Generative AI Survey.…
-
China-Linked TAG-112 Targets Tibetan Media with Cobalt Strike Espionage Campaign
A China-linked nation-state group called TAG-112 compromised Tibetan media and university websites in a new cyber espionage campaign designed to facilitate the delivery of the Cobalt Strike post-exploitation toolkit for follow-on information collection.”The attackers embedded malicious JavaScript in these sites, which spoofed a TLS certificate error to trick visitors into downloading a First seen on…
-
Russian Spies Jumped From One Network to Another Via Wi-Fi in an Unprecedented Hack
In a first, Russia’s APT28 hacking group appears to have remotely breached the Wi-Fi of an espionage target by hijacking a laptop in another building across the street. First seen on wired.com Jump to article: www.wired.com/story/russia-gru-apt28-wifi-daisy-chain-breach/
-
Russian Hackers Deploy HATVIBE and CHERRYSPY Malware Across Europe and Asia
Threat actors with ties to Russia have been linked to a cyber espionage campaign aimed at organizations in Central Asia, East Asia, and Europe.Recorded Future’s Insikt Group, which has assigned the activity cluster the name TAG-110, said it overlaps with a threat group tracked by the Computer Emergency Response Team of Ukraine (CERT-UA) as UAC-0063,…
-
Chinese APTs Shift Tactics to Evade Detection and Maintain Stealth
In light of increasing global tensions and heightened scrutiny, Chinese Advanced Persistent Threat (APT) groups are adapting their strategies to avoid detection and maintain stealth in their cyber espionage operations.... First seen on securityonline.info Jump to article: securityonline.info/chinese-apts-shift-tactics-to-evade-detection-and-maintain-stealth/
-
Sync-Scheduler Malware: Unveiling a Sophisticated Espionage Attack
In a detailed report, the BlackBerry Research and Intelligence Team has revealed a highly targeted cyber espionage campaign against the Pakistan Navy, executed by a sophisticated and likely state-sponsored threat... First seen on securityonline.info Jump to article: securityonline.info/sync-scheduler-malware-unveiling-a-sophisticated-espionage-attack/
-
Linux Malware WolfsBane and FireWood Linked to Gelsemium APT
New Linux malware WolfsBane and FireWood have been linked to Gelsemium APT, a cyber-espionage group targeting critical systems First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/linux-malware-wolfsbane-firewood/
-
Dozens of Central Asian targets hit in recent Russia-linked cyber-espionage campaign
First seen on therecord.media Jump to article: therecord.media/central-asia-cyber-espionage-tag-110-russia
-
LIMINAL PANDA A Chinese State-Sponsored Espionage Targeting Telecoms
CrowdStrike has revealed a new China-nexus state-sponsored adversary tracked as LIMINAL PANDA, which has been systematically targeting telecommunications providers since at least 2020. This revelation comes ahead of Adam Meyers,... First seen on securityonline.info Jump to article: securityonline.info/liminal-panda-a-chinese-state-sponsored-espionage-targeting-telecoms/
-
‘Water Barghest’ Sells Hijacked IoT Devices for Proxy Botnet Misuse
Tags: botnet, cyber, cybercrime, espionage, group, iot, marketplace, router, vulnerability, zero-dayAn elusive, sophisticated cybercriminal group has used known and zero-day vulnerabilities to compromise more than 20,000 SOHO routers and other IoT devices so far, and then puts them up for sale on a residential proxy marketplace for state-sponsored cyber-espionage actors and others to use. First seen on darkreading.com Jump to article: www.darkreading.com/cloud-security/water-barghest-sells-hijacked-iot-devices-proxy-botnet-misuse
-
African Reliance on Foreign Suppliers Boosts Insecurity Concerns
Recent backdoor implants and cyber-espionage attacks on their supply chains have African organizations looking to diversify beyond Chinese, American tech vendors. First seen on darkreading.com Jump to article: www.darkreading.com/cyber-risk/african-reliance-on-foreign-suppliers-boosts-insecurity
-
China-Backed Hackers Leverage SIGTRAN, GSM Protocols to Infiltrate Telecom Networks
A new China-linked cyber espionage group has been attributed as behind a series of targeted cyber attacks targeting telecommunications entities in South Asia and Africa since at least 2020 with the goal of enabling intelligence collection.Cybersecurity company CrowdStrike is tracking the adversary under the name Liminal Panda, describing it as possessing deep knowledge about telecommunications…
-
T-Mobile Breached in Major Chinese Cyber-Attack on Telecoms
T-Mobile was hit by Salt Typhoon, a Chinese cyber-espionage group targeting US and global telecom firms First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/tmobile-breached-chinese/
-
Chinese Hackers Exploit T-Mobile and Other U.S. Telecoms in Broader Espionage Campaign
U.S. telecoms giant T-Mobile has confirmed that it was also among the companies that were targeted by Chinese threat actors to gain access to valuable information.The adversaries, tracked as Salt Typhoon, breached the company as part of a “monthslong campaign” designed to harvest cellphone communications of “high-value intelligence targets.” It’s not clear what information was…
-
18th November Threat Intelligence Report
The FBI and CISA issued a joint statement detailing a major Chinese cyber-espionage campaign targeting U.S. telecommunications infrastructure, led by the APT group Salt Typhoon. This operation compromised networks to steal call […] First seen on research.checkpoint.com Jump to article: research.checkpoint.com/2024/18th-november-threat-intelligence-report/

