Fancy Bear hackers successfully penetrated Ukrainian gas firm Burisma
It is unclear what data the hackers were looking to steal.
It is unclear what data the hackers were looking to steal.
The vulnerability is related to a standard component of Broadcom chips called a spectrum analyzer.
The new tool acts as a fileless post-exploitation framework allowing its operators to perform stealthy and persistent reconnaissance and lateral movement.
The group uses both proprietary and publicly available tools to target NGO's networks.
The BIOLOAD malware has a low detection rate and shares some similarities with BOOSTWRITE loader, another tool in FIN7's arsenal.
It appears the attackers avoid encrypting the *NIX system folders used by WSL so as not to impact the functionality of the WSL installations.
The botnet reuses part of the Gafgyt code and relies on the DHT protocol to build a P2P network.
The campaign attempts to trick users into handing over considerably more than ‘only’ their access credentials.
The campaigns do not seem to target specific industries, instead trying to reach as many victims as possible.
The Chinese hackers carried out a global espionage campaign that targeted a wide variety of industries.
Showing elements 3831 - 3840