North Korean APT37 exploited IE zero-day to infect targets with malware
The attackers first compromised the server of the Korean online advertising agency and injected malicious code in the server’s ad content script.
The attackers first compromised the server of the Korean online advertising agency and injected malicious code in the server’s ad content script.
The online marketplace, which served both Finnish and English-speaking users, boasted a turnover of €1.3 million.
Initially focused on cyberespionage and data theft, the group has recently shifted toward psychological operations.
ESET’s telemetry shows that the surge in the scams began in mid-2024, with a sharp increase in July.
The company did not clarify whether any unreleased projects or future game details were leaked.
By exploiting the flaw an attacker could take control of Tor Browser.
The flaws have been exploited to gain unauthorized access and carry out a range of malicious actions.
Microsoft now recommends that organizations move to the SSTP and IKEv2 protocols.
In its latest campaign, OilRig targeted Microsoft Exchange servers, exploiting the Windows privilege escalation flaw.
The removed network had been promoting criticism of pro-European President Maia Sandu.
Showing elements 1011 - 1020