China-linked #LapDogs campaign has been active since 2023, dropping the #ShortLeash backdoor and using hacked routers to hide espionage and data theft.
Read: https://hackread.com/china-lapdogs-drops-shortleash-backdoor-fake-certs/
China-linked #LapDogs campaign has been active since 2023, dropping the #ShortLeash backdoor and using hacked routers to hide espionage and data theft.
Read: https://hackread.com/china-lapdogs-drops-shortleash-backdoor-fake-certs/
Anti-spying phone pouches offered to EU lawmakers for trip to Hungary – POLITICO https://www.byteseu.com/943547/ #Communications #CyberEspionage #cybersecurity #DataProtection #Espionage #Hungary #Intelligence #malware #PernandoBarrenaArza #Privacy #RuleOfLaw #SophieWilmès #StateBackedHacking #surveillance #Technology #Telecoms #TinekeStrik
Huawei top executive in Europe charged in Belgian corruption probe – POLITICO https://www.byteseu.com/904367/ #5G #Belgium #BrusselsBubble #CertificationAndStandards #China #Corruption #CriticalInfrastructure #CyberEspionage #cybersecurity #DataProtection #DigitalSingleMarket #Espionage #Europe #Exclusive #hackers #HuaweiCorruptionScandal #Intelligence #InternetOfThings #Lobbying #MoneyLaundering #NetworkSecurity #Portugal #PublicAffairs #Technology #Telecoms #Transparency
ODNI 2025 Threat Assessment notes threats from Russia, China, Iran, North Korea targeting critical infrastructure, telecom https://www.byteseu.com/865203/ #2025AnnualThreatAssessmentReport #ASATMissiles #Conflicts #CriticalInfrastructure #CyberEspionage #CyberThreats #CyberAttacks #Finance #Iran #JammingSystems #LEO #malware #Security #ThreatAssessment #trade
Cyberespionage groups or cybercriminals? UAV and C-UAV vendors and buyers are increasingly targeted.
#Resecurity had an interesting post on the topic.
As an example: about 1 GB of compressed #FortemTechnologies internal files wound up in the hands of an adversary, but Fortem denies there was any breach, claiming (wait for it):
" There was no breach. The files in question were attached to emails that had been shared outside of our network."
Shared intentionally with an adversary or cybercriminal? I tend to doubt that....
https://www.europesays.com/1663344/ Romania’s presidential front-runner Georgescu benefited from Russia-style booster campaign, declassified docs say – POLITICO #CalinGeorgescu #CyberEspionage #CyberWarfare #CybersecurityAndDataProtection #DISINFORMATION #elections #ElectionsInEurope #EuRussiaRelations #MaiaSandu #News #romania #RomanianElections2024 #RomanianPolitics #Russia #RussianPolitics #Ukraine #UnitedStates #VladimirPutin #WarInUkraine #world #WorldNews #WorldTopics
Cyber espionage is one of the most advanced types of cyberattacks, often involving highly sophisticated and carefully planned techniques.
For our #CyberSecMonth campaign, Andrej Zieger ( @dfncert @DFN ) tells us why it's something we all need to be aware of, and how we can protect ourselves and our organisations.
APT41 Hackers Attacking Research Institute with ShadowPad and Cobalt Strike
#cybersecurity #cyberespionage #malware https://cybersecuritynews.com/apt41-hackers-attacking-research-institute/
Hackers breach ISP to poison software updates with malware
#CYBERESPIONAGE #EVASIVEPANDA #cybersecurity #malware https://www.bleepingcomputer.com/news/security/hackers-breach-isp-to-poison-software-updates-with-malware/
The not-so-silent type: Vulnerabilities across keyboard apps reveal keystrokes to network eavesdroppers
India's government, energy sector breached in cyber-espionage campaign
https://therecord.media/india-infostealer-government-energy-sector-espionage #cybersecurity #malware #india #govt #energy #breach #CyberEspionage #HackBrowserData
The witnesses, who included the dirs of the #FBI, the #NSA, the #DIA, & the State Dept’s #INR, spoke about a panoply of challenges, from an ambitious #China to the proliferation of #ArtificialIntelligence & the continuing #threat of #cyberespionage & #CyberWarfare. Brett Holmgren, the State Dept’s top #intelligence ofcl, said that the power of #AI could “lower the barrier” for #UnitedStates adversaries to engage in #ElectionInterference.
#NationalSecurity #ForeignPolicy #terrorism #geopolitics
Excellent article de #Mediapart sur I-Soon. Très honoré d'y être cité :-)
https://www.mediapart.fr/journal/international/040324/bienvenue-i-soon-chez-les-cybermercenaires-qui-espionnent-la-solde-de-pekin #isoon #i-soon #cyberespionnage #cyberespionage
Chinese spies hacked Dutch defence network last year – intelligence agencies https://www.euractiv.com/section/cybersecurity/news/chinese-spies-hacked-dutch-defence-network-last-year-intelligence-agencies/?utm_source=dlvr.it&utm_medium=mastodon #China #cyberespionage #Cybersecurity #hackers #Netherlands
To mitigate the risks associated with such attacks, organizations are advised to enforce strong password policies, implement two-factor authentication (2FA), limit login attempts, monitor SSH traffic, and maintain up-to-date systems and software.
#Cybersecurity #Cyberattack #Cyberespionage #Netherlands #HackerGroup #SeaTurtle
Attributed to Chinese hackers are numerous offenses, such as the theft of personal information from US citizens encompassing medical records, financial data, and even fingerprints.
" #NKabuse Exposed: North Korean APT's Sophisticated Cyber Espionage
"
Kaspersky's Global Emergency Response Team (GERT) and GReAT have identified a new multiplatform threat named "NKAbuse," which exploits the NKN (New Kind of Network) protocol. This malware, written in Go, targets primarily Linux desktops but can also infect MISP and ARM systems, posing a risk to IoT devices. NKAbuse infiltrates systems by uploading an implant, establishing persistence through a cron job, and installing itself in the host's home folder. It offers a range of capabilities, including flooding, backdoor access, and remote administration (RAT).
The initial attack vector exploited an old vulnerability related to Struts2 (CVE-2017-5638 - Apache Struts2), targeting a financial company. NKAbuse uses the NKN protocol for bot communication, enabling it to perform a variety of DDoS attacks and act as a backdoor. It also has RAT capabilities, allowing it to capture screenshots, manage files, and execute system commands. This threat is notable for its use of blockchain technology, ensuring reliability and anonymity, and has been detected in Colombia, Mexico, and Vietnam.
The article, written by Costin Raiu, Brian Bartholomew, and team, unravels IoC's and NKabuse's tactics, including a custom backdoor and strategic web compromises.
Source: Securelist - Unveiling NKabuse
Tags: #CyberEspionage #APT #NorthKorea #CyberSecurity #KonniRAT #StateSponsored #CyberThreats #SocialEngineering #Malware #InfoSecCommunity
This backdoor was previously disclosed by CERT-UA in attacks targeting critical infrastructure in Ukraine.
NEW episode of DISCARDED
Greg Lesnewich joins us to talk about recent activity from the Russian APT #TA422 that includes exploiting two different vulnerabilities. We also dive into the importance of knowing and examining biases, the use of less fancy malware and more living off the land tactics by Russian groups, and why people call him Gregles.
#cyberespionage #threathunting #APT
Apple: https://lnkd.in/efsaiDVH
Spotify: https://lnkd.in/eJpcAfz7
Google: https://lnkd.in/eg_Rpc5q
Despite operating for years, there’s limited evidence of XDSpy’s activities in Russia, attributed to the exit of foreign cybersecurity firms following the Ukrainian invasion.
#Cybersecurity #NorthKorea #Cyberattacks #China #CyberEspionage #Russia