Tag: espionage
-
US Organization in China Falls Victim to Suspected Chinese Espionage Campaign
by
in SecurityNewsA recent report from the Symantec Threat Hunter Team reveals a troubling cyberespionage operation targeting a large US organization operating in China. The attack, suspected to be the work of... First seen on securityonline.info Jump to article: securityonline.info/us-organization-in-china-falls-victim-to-suspected-chinese-espionage-campaign/
-
Turla targets Pakistani APT infrastructure for espionage
by
in SecurityNewsFirst seen on scworld.com Jump to article: www.scworld.com/brief/turla-targets-pakistani-apt-infrastructure-for-espionage
-
Russian Hacker Secret Blizzard Hijack C2 Infrastructure in New Espionage Campaign
by
in SecurityNewsLumen’s Black Lotus Labs has uncovered an elaborate campaign by the Russian threat actor Secret Blizzard (also known as Turla). This operation demonstrates their signature tradecraft of hijacking other groups’... First seen on securityonline.info Jump to article: securityonline.info/russian-hacker-secret-blizzard-hijack-c2-infrastructure-in-new-espionage-campaign/
-
Russian APT Hackers Co-Opt Pakistani Infrastructure
by
in SecurityNewsFSB Hackers Have Hijacked Others’ Command and Control Before. A Russian state hacking group hijacked the command and control infrastructure of a Pakistan-based espionage network as part of an ongoing intelligence-gathering operation targeting victims in Asia, finds a report from Microsoft and Black Lotus Labs. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/russian-apt-hackers-co-opt-pakistani-infrastructure-a-26982
-
US may plan legislation to contain Chinese cyber espionage
by
in SecurityNewsUS senators were briefed behind closed doors this week on the scale of “Salt Typhoon,” an alleged Chinese cyber-espionage campaign targeting the nation’s telecommunications networks.The FBI, CISA, and other key agencies, who were part of the briefing, revealed that the sophisticated operation compromised at least eight US telecom firms, stealing metadata and call intercepts, including…
-
Russian Hackers Exploit Rival Attackers’ Infrastructure for Espionage
by
in SecurityNews
Tags: apt, blizzard, cyber, cybercrime, espionage, exploit, hacker, infrastructure, microsoft, russiaMicrosoft has found that Russian APT Secret Blizzard piggybacks on other cybercriminals’ infr4asytructure to conduct cyber espionage First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/russia-hackers-exploit-rival/
-
White House: Chinese telecom hacks have been in motion for years
by
in SecurityNewsA senior administration official said Wednesday the Salt Typhoon hack has impacted dozens of countries in a sweeping espionage campaign First seen on cyberscoop.com Jump to article: cyberscoop.com/salt-typhoon-national-security-council-chinese-spying/
-
Security teams should act now to counter Chinese threat, says CISA
by
in SecurityNews
Tags: 5G, access, apple, at&t, attack, authentication, china, cisa, cisco, communications, control, cyber, cybersecurity, data, encryption, espionage, exploit, google, government, hacker, infrastructure, linux, microsoft, mitigation, mobile, monitoring, network, nist, password, risk, service, siem, technology, theft, threat, vpn, vulnerabilitySecurity teams and individuals across the US need to take immediate precautions to counter the surveillance threat posed by Chinese ‘Salt Typhoon’ hackers, who have burrowed deep into telecoms infrastructure, according to the US Cybersecurity and Infrastructure Security Agency (CISA).CISA issued an official alert recommending defensive measures on December 3, as federal officials briefed journalists…
-
Russian-linked Turla caught using Pakistani APT infrastructure for espionage
by
in SecurityNewsBoth Microsoft and Lumen’s BlackLotus Labs found Turla spying on Afghanistan and India via Pakistani infrastructure. First seen on cyberscoop.com Jump to article: cyberscoop.com/turla-infiltrates-pakistani-apt-networks-microsoft-lumen/
-
Senators Warn the Pentagon: Get a Handle on China’s Telecom Hacking
by
in SecurityNewsIn a letter to the Department of Defense, senators Ron Wyden and Eric Schmitt are calling for an investigation into fallout from the Salt Typhoon espionage campaign. First seen on wired.com Jump to article: www.wired.com/story/senators-warn-pentagon-salt-typhoon-china-hacking/
-
Russian hackers hijack Pakistani hackers’ servers for their own attacks
The notorious Russian cyber-espionage group Turla is hacking other hackers, hijacking the Pakistani threat actor Storm-0156’s infrastructure to launch their own covert attacks on already compromised networks. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/russian-turla-hackers-hijack-pakistani-apt-servers-for-cyber-espionage-attacks/
-
Australia, Canada, New Zealand, and the U.S. warn of PRC-linked cyber espionage targeting telecom networks
by
in SecurityNewsAustralia, Canada, New Zealand, and the U.S. warn of PRC-linked cyber espionage targeting telecom networks in a joint advisory. Australia, Canada, New Zealand, and the U.S. issued a joint advisory to warn of People’s Republic of China (PRC)-linked cyber espionage targeting telecom networks. >>The Cybersecurity and Infrastructure Security Agency (CISA), National Security Agency (NSA), Federal…
-
Joint Advisory Warns of PRC-Backed Cyber Espionage Targeting Telecom Networks
A joint advisory issued by Australia, Canada, New Zealand, and the U.S. has warned of a broad cyber espionage campaign undertaken by People’s Republic of China (PRC)-affiliated threat actors targeting telecommunications providers.”Identified exploitations or compromises associated with these threat actors’ activity align with existing weaknesses associated with victim infrastructure; no novel First seen on thehackernews.com…
-
BlackBerry Highlights Rising Software Supply Chain Risks in Malaysia
by
in SecurityNews
Tags: access, ai, attack, breach, ceo, ciso, communications, compliance, cyber, cyberattack, cybersecurity, data, detection, espionage, finance, framework, government, infrastructure, intelligence, international, Internet, iot, malware, mobile, monitoring, phishing, ransomware, regulation, resilience, risk, skills, software, strategy, supply-chain, threat, tool, training, vulnerabilityIn 2024, BlackBerry unveiled new proprietary research, underscoring the vulnerability of software supply chains in Malaysia and around the world.According to the study, 79% of Malaysian organizations reported cyberattacks or vulnerabilities in their software supply chains during the past 12 months, slightly exceeding the global average of 76%. Alarmingly, 81% of respondents revealed they had…
-
Chinese LIDAR Dominance a Cybersecurity Threat, Warns Think Tank
by
in SecurityNewsThe Foundation for Defense of Democracies has warned that Chinese-made LIDAR sensors could be weaponized for espionage First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/chinese-lidar-dominance/
-
ElizaRAT Exploits Google, Telegram, Slack Services For C2 Communications
by
in SecurityNewsAPT36, a Pakistani cyber-espionage group, has recently upgraded its arsenal with ElizaRAT, a sophisticated Windows RAT that, initially detected in 2023, employs advanced evasion tactics and robust C2 capabilities to target Indian government agencies, diplomatic personnel, and military installations. The group leverages multiple platforms, including Windows, Linux, and Android, to broaden its attack surface as…
-
From US to UAE: APT35 Expands Reach in Cyber Espionage
by
in SecurityNewsThe ThreatBook Research and Response Team has revealed a sophisticated campaign by APT35, also known as Magic Hound or Charming Kitten, targeting the aerospace and semiconductor industries across multiple countries,... First seen on securityonline.info Jump to article: securityonline.info/from-us-to-uae-apt35-expands-reach-in-cyber-espionage/
-
The New Face of Cyber Espionage: Inside the Two-Stage Infection Strategy of China-Linked Threat Actors
First seen on thefinalhop.com Jump to article: www.thefinalhop.com/china-linked-hackers-adopt-sophisticated-two-stage-infection-tactic-to-deploy-deuterbear-rat/
-
ANEL Backdoor Reactivated in Earth Kasha Cyber-Espionage Campaign
by
in SecurityNewsIn June 2024, Trend Micro identified a new spear-phishing campaign targeting political organizations, research institutions, and think tanks in Japan. This operation, attributed to the cyber-espionage group Earth Kasha, marks... First seen on securityonline.info Jump to article: securityonline.info/anel-backdoor-reactivated-in-earth-kasha-cyber-espionage-campaign/
-
Russian Hackers Target Mozilla, Windows in New Exploit Chain
by
in SecurityNewsESET Discovers Two Major Vulnerabilities Exploited by Russian RomCom Hacking Group. Two vulnerabilities in Mozilla products and Windows are actively exploited by RomCom, a Kremlin-linked cybercriminal group known for targeting businesses and conducting espionage, warn security researchers from Eset. Exploiting the two flaws together enables attackers to execute arbitrary code. First seen on govinfosecurity.com Jump…
-
Salt Typhoon Builds Out Malware Arsenal With GhostSpider
by
in SecurityNewsThe APT, aka Earth Estries, is one of China’s most effective threat actors, performing espionage for sometimes years on end against telcos, ISPs, and governments before being detected. First seen on darkreading.com Jump to article: www.darkreading.com/application-security/salt-typhoon-malware-arsenal-ghostspider
-
Aggressive Chinese APT Group Targets Governments with New Backdoors
by
in SecurityNewsA Trend Micro analysis of Earth Estries found that the Chinese threat actor is using new backdoors to avoid detection during espionage operations First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/chinese-apt-governments-backdoors/
-
Beijing claims it’s found ‘underwater lighthouses’ that its foes use for espionage
by
in SecurityNews
Tags: espionageFirst seen on theregister.com Jump to article: www.theregister.com/2024/10/30/china_seabed_surveillance_device_claims/
-
South Asian hackers target Pakistani entities in new espionage campaign
by
in SecurityNewsFirst seen on therecord.media Jump to article: therecord.media/south-asian-hackers-target-pakistan-entities-in-espionage-campaign
-
Russia-linked APT TAG-110 uses targets Europe and Asia
by
in SecurityNewsRussia-linked threat actors TAG-110 employed custom malware HATVIBE and CHERRYSPY to target organizations in Asia and Europe. Insikt Group researchers uncovered an ongoing cyber-espionage campaign by Russia-linked threat actor TAG-110 that employed custom malware tools HATVIBE and CHERRYSPY. The campaign primarily targeted government entities, human rights groups, and educational institutions in Central Asia, East Asia,…
-
ISMG Editors: China-Linked Espionage Targets US Telecoms
by
in SecurityNewsAlso: Highlights from ISMG’s Financial Services Summit and Key Insights on AI Adoption. On the 200th episode of the ISMG Editors’ Panel, the team discussed the major China-linked cyberespionage campaign targeting U.S. telecommunications, highlighted key insights from ISMG’s Financial Services Summit in New York and unpacked the top findings from ISMG’s annual Generative AI Survey.…
-
ISMG Editors: China-Linked Espionage Targets U.S. Telecoms
by
in SecurityNewsAlso: Highlights from ISMG’s Financial Services Summit and Key Insights on AI Adoption. On the 200th episode of the ISMG Editors’ Panel, the team discussed the major China-linked cyberespionage campaign targeting U.S. telecommunications, highlighted key insights from ISMG’s Financial Services Summit in New York, and unpacked the top findings from ISMG’s annual Generative AI Survey.…