Hackers compromise FBI email server to sent fake security alerts
Fake alerts reached at least 100,000 inboxes, but the number could much higher, as the researchers believe that "the campaign was potentially much, much larger."
Fake alerts reached at least 100,000 inboxes, but the number could much higher, as the researchers believe that "the campaign was potentially much, much larger."
Between September 2014 and December 2016, Aleksandr Zhukov operated a fake ad network that stole stole more than $7 million from U.S. companies.
The MACMA malware “seems to be a product of extensive software engineering,” the researchers said.
The new campaign leverages the original IDA Pro 7.5 software bundled with two malicious components.
The hackers obtained an access key, which provided access to a limited subset of information held in the Aruba Central cloud environment.
The group has been active since at least 2015, primarily focusing on cyberespionage and data theft.
Researchers at Palo Alto Networks also spotted the same Chinese group scanning ManageEngine ADSelfService Plus servers from mid-September to early October.
Although SolarWinds released a patch for this vulnerability almost four months ago, the are still over 60% potentially vulnerable Serv-U servers.
Microsoft has also fixed four publicly disclosed vulnerabilities not known to be exploited by hackers.
The ransomware attack took place over a weekend and affected numerous retail stores across Europe.
Showing elements 2771 - 2780