Tag: spy
-
North Korean APT Targets Yanbian Gamers via Trojanized Platform
ESET warns that North Korean hackers compromised a Yanbian gaming site in a supply”‘chain attack, trojanizing Windows and Android software to spy on users First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/scarcruft-birdcall-android-yanbian/
-
North Koreans Spy on Defectors Via Android Game Apps
Website Popular in Korean Ethnic Enclave in China Hosts Apps Laced With a Backdoor. A North Korean hacking group has been spying on a Korean ethnic enclave in China by infiltrating the Android apps of a regional gaming platform that hosts digital card and board games. Researchers attributed the supply-chain attack to a threat actor…
-
North Korean hackers trojanize gaming platform to spy on ethnic Koreans in China
A gaming platform built for ethnic Koreans in China has been serving backdoored Windows and Android software to its users since late 2024. The platform, sqgame[.]net, hosts … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/05/05/china-scarcruft-supply-chain-attack/
-
Feds Indict Ex-Hospital Pharmacist for Spying on Co-Workers
Defendant Is Also at Center of a Civil Class Action Against His Former Employer. A federal grand jury has indicted a former Maryland hospital pharmacist, alleging he weaponized tech tools – including keylogging – to steal credentials and spy on nearly 200 co-workers and other individuals over an eight-year period. The defendant is also the…
-
Met Police face criticism for using AI to spy on their own officers
London police officers have been warned by the Metropolitan Police Federation to watch their backs after the force deployed controversial AI software to investigate … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/04/30/metropolitan-police-ai-monitoring-officers-palantir/
-
House approves spy program on second attempt, Senate fate murky
The bill, which passed 235-191, would renew Section 702 of the Foreign Intelligence Surveillance Act for three years. First seen on therecord.media Jump to article: therecord.media/house-approves-spy-program-on-second-attempt
-
Spy agency officials say job loss anxiety, moving fast ‘safely’ among top challenges in AI workforce overhaul
While tech leaders think about how to strategically deploy AI tools to support human intelligence needs, rank and filers express concerns about their livelihoods. First seen on cyberscoop.com Jump to article: cyberscoop.com/national-geospatial-intelligence-ai-agency-leaders-say-job-loss-safety-top-concerns/
-
Chinese spy posed as researcher in spear-phishing campaign targeting NASA to steal defense software
A Chinese national posed as a U.S. researcher, tricking NASA staff in a phishing campaign to steal sensitive data tied to defense software and exports. A Chinese national ran a spear-phishing campaign by posing as a U.S. researcher and tricked NASA employees into sharing sensitive information. The NASA Office of Inspector General (OIG) and federal…
-
Latest spy power reauthorization bill leaves critics unimpressed
Tags: spyAn April 30 deadline is looming to extend expiring Section 702 powers, and the newest legislation to re-up it is drawing fire from the left and right. First seen on cyberscoop.com Jump to article: cyberscoop.com/section-702-fisa-reauthorization-bill-leaves-critics-unimpressed/
-
The Latest Push to Extend Key US Spy Powers Is Still a Mess
A US surveillance program that lets the FBI view Americans’ communications without a warrant is up for renewal. A new bill aims to address mounting lawmaker concerns”, with smoke and mirrors. First seen on wired.com Jump to article: www.wired.com/story/the-latest-push-to-extend-key-us-spy-powers-is-still-a-mess/
-
Surveillance companies exploiting telecom system to spy on targets’ locations, research shows
The campaigns exploited a weakness in telecom infrastructure to allow the unnamed vendors to secretly pose as real cellular providers and pinpoint victims’ locations. First seen on therecord.media Jump to article: therecord.media/surveillance-companies-exploiting-telecom-systems-to-track-location
-
Chinese APT Abuses Multiple Cloud Tools to Spy on Mongolia
The threat actor gave itself plenty of options to support command and control, tapping Microsoft Outlook, Slack, Discord, and file.io for online espionage. First seen on darkreading.com Jump to article: www.darkreading.com/cyberattacks-data-breaches/chinese-apt-abuses-cloud-tools-spy-mongolia
-
Chinese hackers using compromised networks to spy on Western companies, says Five Eyes
Companies urged to take countermeasures as Chinese hacking groups use networks of infected home and office devices ‘at scale’ to evade security monitoring systems First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366641986/Chinese-hackers-using-compromised-networks-to-spy-on-Western-companies-says-Five-Eyes
-
Surveillance vendors caught abusing access to telcos to track people’s phone locations, researchers say
The Citizen Lab found two separate surveillance vendors abusing the backbone of cellular networks to spy on several victims across the world. First seen on techcrunch.com Jump to article: techcrunch.com/2026/04/23/surveillance-vendors-caught-abusing-access-to-telcos-to-track-peoples-phone-locations-researchers-say/
-
Microsoft-Signed Binary Helps Deliver LOTUSLITE in India Spy Campaign
Microsoft-signed developer tooling is being abused to quietly deploy a new LOTUSLITE backdoor variant against India’s banking sector, in what researchers link to the China”‘nexus Mustang Panda espionage cluster with moderate confidence. The backdoor retains its espionage profile, offering remote shell access, file operations, and session management rather than any obvious monetization features. Communications are…
-
A Token Flaw Turned Azure’s AI Agent Into a Spy
Outsiders Could Exploit Misconfig to Stream Commands, Credentials. A misconfiguration in Microsoft’s Azure SRE Agent may have allowed any Azure account holder from any company to tap into another organization’s agent conversations in real time, watching commands, outputs and credentials, leaving no trace. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/token-flaw-turned-azures-ai-agent-into-spy-a-31462
-
A Token Flaw Turned Azure’s AI Agent Into a Spy
Outsiders Could Exploit Misconfig to Stream Commands, Credentials. A misconfiguration in Microsoft’s Azure SRE Agent may have allowed any Azure account holder from any company to tap into another organization’s agent conversations in real time, watching commands, outputs and credentials, leaving no trace. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/token-flaw-turned-azures-ai-agent-into-spy-a-31462
-
Fake TikTok Downloaders on Chrome and Edge Spying on 130,000 Users
Over 130,000 users are at risk from fake TikTok downloader extensions on Chrome and Microsoft Edge. Researchers discovered these malicious tools use device fingerprinting to spy on users and steal sensitive browser data. First seen on hackread.com Jump to article: hackread.com/fake-tiktok-downloaders-chrome-edge-spy-users/
-
A History of Global Hacking, and Where It’s Going Next
In her new book, Code War: How Nations Hack, Spy, and Shape the Digital Battlefield, Allie Mellen provides true stories of the current cyber war and, importantly, what might be ahead. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/04/a-history-of-global-hacking-and-where-its-going-next/
-
With US spy laws set to expire, lawmakers are split over protecting Americans from warrantless surveillance
Some lawmakers are calling for widespread reforms following years of surveillance scandals and abuses across successive U.S. administrations. But even if the spy law known as Section 702 expires in April, the government’s spy powers will not automatically lapse. First seen on techcrunch.com Jump to article: techcrunch.com/2026/04/17/with-us-spy-laws-set-to-expire-lawmakers-are-split-over-protecting-americans-from-warrantless-surveillance/
-
Republican Mutiny Sinks Trump’s Push to Extend Warrantless Surveillance
Tags: spyA post-midnight revolt in the House sank the White House’s efforts to extend Section 702″, a spy program the FBI has used to look into members of Congress, protesters, and political donors. First seen on wired.com Jump to article: www.wired.com/story/republican-mutiny-sinks-trumps-push-to-extend-warrantless-surveillance/
-
‘It reads like a spy novel’: $280 million theft from Drift involved North Korean fake companies, cutouts
Drift officials said the operation began six months ago, when they were approached at a cryptocurrency conference by members of a company claiming to focus on quantitative trading. First seen on therecord.media Jump to article: therecord.media/drift-crypto-theft-post-mortem-north-korea
-
Operation Masquerade: FBI Disrupts Russian Router Hacking Campaign
Operation Masquerade: The FBI and DoJ disrupted a Russian GRU campaign that hijacked routers via DNS attacks to spy on users and steal credentials. First seen on hackread.com Jump to article: hackread.com/operation-masquerade-fbi-russia-router-hacking/
-
Russian hacking group targets home and small office routers to spy on users
The FBI, NCSC, and Microsoft warn of an ongoing Russian campaign hijacking DNS settings on home and small office routers to spy on users. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/04/russian-hacking-group-targets-home-and-small-office-routers-to-spy-on-users/
-
Fiber Optic Cables Turned Into Hidden Microphones to Spy on Private Conversations
Internet users worldwide rely on fiber optic cables for blazing-fast and secure web connections. However, a groundbreaking discovery reveals that these very cables can be turned into covert listening devices. In a newly published 2026 cybersecurity research paper, experts demonstrated how standard telecom optical fibers can secretly capture airborne sounds, allowing attackers to eavesdrop on…
-
Russian Threat Actors Abuse Home Routers in Expanding DNS Hijacking Wave
Russian military-linked hackers are actively compromising poorly secured home and small-office routers to hijack internet traffic and spy on organizations worldwide. Microsoft Threat Intelligence recently exposed this massive global campaign by a group known as Forest Blizzard, which has already impacted over 200 organisations and 5,000 consumer devices. Forest Blizzard is a sophisticated state-sponsored threat…
-
Russian Hackers Hit SOHO Routers in Cyberespionage Campaign
Tags: cloud, cyberespionage, dns, government, hacker, intelligence, microsoft, military, router, russia, spyHijacking DNS Settings Helps Russian Hackers Decrypt TLS Traffic, Microsoft Warns. Hackers tied to Russia’s GRU military intelligence agency are compromising SOHO routers to hijack their DNS settings and spy on the cloud activities of high-value government, IT, telecommunications and energy organizations, Microsoft warns. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/russian-hackers-hit-soho-routers-in-cyberespionage-campaign-a-31354
-
Russian Hackers Hit SOHO Routers in Cyberespionage Campaign
Tags: cloud, cyberespionage, dns, government, hacker, intelligence, microsoft, military, router, russia, spyHijacking DNS Settings Helps Russian Hackers Decrypt TLS Traffic, Microsoft Warns. Hackers tied to Russia’s GRU military intelligence agency are compromising SOHO routers to hijack their DNS settings and spy on the cloud activities of high-value government, IT, telecommunications and energy organizations, Microsoft warns. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/russian-hackers-hit-soho-routers-in-cyberespionage-campaign-a-31354
-
Russian Hackers Hit SOHO Routers in Cyberespionage Campaign
Tags: cloud, cyberespionage, dns, government, hacker, intelligence, microsoft, military, router, russia, spyHijacking DNS Settings Helps Russian Hackers Decrypt TLS Traffic, Microsoft Warns. Hackers tied to Russia’s GRU military intelligence agency are compromising SOHO routers to hijack their DNS settings and spy on the cloud activities of high-value government, IT, telecommunications and energy organizations, Microsoft warns. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/russian-hackers-hit-soho-routers-in-cyberespionage-campaign-a-31354

