Ukrainian military personnel targeted via messaging apps and dating sites
The threat actor employs a range of software in their malicious activities, including both commercial programs and open-source tools.
The threat actor employs a range of software in their malicious activities, including both commercial programs and open-source tools.
This marks the first time Russian nation-state hackers have posed a direct threat to critical infrastructure in Western countries.
The investigation found over 40 000 phishing domains linked to LabHost, which had some 10 000 users worldwide.
The attackers attempted to introduce suspicious updates or asked to be made maintainers of the targeted software.
Cybersecurity researchers have observed a surge in attacks targeting CVE-2023-1389.
The consequences of a successful attack can range from unauthorized network access and account lockouts to denial-of-service conditions.
Kapeka is a flexible backdoor, which serves as an early-stage toolkit.
LightSpy contains modules designed to exfiltrate device information and saved files.
Parks allegedly manipulated the cloud providers into granting him elevated privileges and benefits.
The malware allows to remotely access victims' computers and perform illicit activities.
Showing elements 1351 - 1360