Threat Actor: GlorySec | GlorySec Victim: City of Saint Petersburg | City of Saint Petersburg Price: Not specified Exfiltrated Data Type: Small databases

Additional Information:

GlorySec has announced a strategic shift in their operations, focusing primarily on Russia. The group has successfully breached and posted several small databases from the city of Saint Petersburg.…
Read More

Summary: NATO allies are being urged to allow their militaries to be proactive in cyberspace to prevent cyberattacks that could disrupt the deployment of forces during a conflict, according to Christian-Marc Lifländer, the head of NATO’s cyber and hybrid policy section.

Threat Actor: Russia | Russia Victim: NATO | NATO

Key Point:

NATO allies need to adopt a proactive approach in cyberspace to prevent cyberattacks that could disrupt military operations during conflicts.…
Read More

Between 27 and 29 May 2024, international law enforcement agencies and partners conducted the Operation Endgame to disrupt criminal services, notably through taking down key botnet infrastructures, including those of IcedID, SystemBC, PikaBot, SmokeLoader and BumbleBee.

The Sekoia TDR team supported the French law enforcement agencies by providing valuable cyber threat intelligence, in particular on PikaBot.…

Read More

Summary: Independent journalists and opposition activists in Europe, who have faced threats from Russia or Belarus, have been targeted or infected with the Pegasus spyware.

Threat Actor: NSO Group | NSO Group Victim: Independent journalists and opposition activists in Europe | Independent journalists and opposition activists in Europe

Key Point :

At least seven Russian and Belarusian-speaking independent journalists and opposition activists in Europe have been targeted or infected with the Pegasus spyware.…
Read More

Summary: OpenAI has reported that threat actors linked to the governments of Russia, China, and Iran have used its tools for influence operations, generating various types of content including articles, social media posts, and fake comments.

Threat Actor: Governments of Russia, China, and Iran | Governments of Russia, China, and Iran Victim: OpenAI | OpenAI

Key Point :

Threat actors from Russia, China, and Iran have utilized OpenAI’s tools for conducting influence operations.…
Read More

Summary: Russian threat actors are using cyberattacks to destabilize countries supporting Ukraine, according to U.S. cyber ambassador Nathaniel Fick, who emphasized the need for digital solidarity among the U.S. and EU to protect against common threats.

Threat Actor: Russian threat actors | Russian threat actors Victim: Countries supporting Ukraine | Countries supporting Ukraine

Key Point:

Russian threat actors are using cyberattacks to destabilize countries supporting Ukraine and sow fear and discord.…
Read More

Summary: Cloudflare’s threat intel team has stopped a month-long phishing and espionage attack targeting Ukraine, attributed to the Russia-aligned gang FlyingYeti, which aimed to exploit financially vulnerable citizens who had benefited from a government moratorium on evictions and utility disconnections for unpaid debt.

Threat Actor: FlyingYeti | FlyingYeti Victim: Financially strapped citizens in Ukraine | Ukraine

Key Point :

FlyingYeti, a Russia-aligned gang, launched a phishing and espionage attack targeting financially vulnerable citizens in Ukraine who had benefited from a government moratorium on evictions and utility disconnections for unpaid debt.…
Read More

CryptoChameleon is a phishing kit first discovered in February 2024. As of publication, the identity of CryptoChameleon’s creator remains elusive.

The kit is used by unknown threat actors to harvest usernames, passwords, password reset URLs, and photo IDs from employees and customers’ mobile devices.

Silent Push Threat Analysts have conducted a wide-ranging research campaign that has revealed a large amount of CryptoChameleon fast flux Indicators of Future Attack (IOFAs) targeting Binance, Coinbase and FCC users, and a host of other platforms, including:

Apple iCloud Google Gemini Kraken Gamdom Ledger Swan Bitcoin Trezor Hardware Wallet Uphold Nexo Crypto Shake Pay CryptoBackground

On 6th February 2024, Silent Push analysts noticed malicious activity targeting the FCC, and reported it confidentially to CISA.…

Read More

Cloudforce One is publishing the results of our investigation and real-time effort to detect, deny, degrade, disrupt, and delay threat activity by the Russia-aligned threat actor FlyingYeti during their latest phishing campaign targeting Ukraine. At the onset of Russia’s invasion of Ukraine on February 24, 2022, Ukraine introduced a moratorium on evictions and termination of utility services for unpaid debt.…

Read More

Estimated reading time: 5 minutes

AsukaStealer, marketed on a Russian-language cybercrime forum by the alias ‘breakcore,’ has been exposed. The perpetrator offers its services for a monthly fee of $80, targeting individuals and organizations seeking to exploit its capabilities for malicious purposes.Written in C++, AsukaStealer features customizable configurations and an intuitive web-based interface, enhancing its usability for cybercriminals seeking to deploy and manage malware efficiently.It…

Read More

Published On : 2024-05-29

EXECUTIVE SUMMARY

A critical vulnerability, identified as CVE-2024-3273, has been discovered in certain end-of-life (EOL) D-Link NAS devices, presenting a severe threat due to the lack of ongoing support and their high susceptibility to attacks. With a CVSS base score of 9.8, this vulnerability is extremely serious, potentially allowing unauthorized access, data theft, system modifications, or denial of service attacks.…

Read More

Summary: Over 50% of IP addresses owned by federal agencies will have enhanced data routing security measures in place by the end of the year to prevent hackers from hijacking digital pathways into government networks.

Threat Actor: Hackers | hackers Victim: Federal agencies | federal agencies

Key Point :

Over 50% of IP addresses owned by federal agencies will have enhanced data routing security measures in place by the end of the year.…
Read More

Summary: This article discusses the emergence of a new Internet hosting firm called Stark Industries Solutions, which is being used as a global proxy network for cyberattacks and disinformation campaigns against enemies of Russia.

Threat Actor: NoName057(16) | NoName057(16) Victim: Government and commercial targets in Ukraine and Europe | Ukraine

Key Point:

A large Internet hosting firm called Stark Industries Solutions has emerged as a global proxy network used for cyberattacks and disinformation campaigns.…
Read More

Summary: The content discusses the need for European research universities to collaborate with intelligence agencies to protect their research from being stolen by hostile states, particularly in sensitive technology areas.

Threat Actor: Chinese state | Chinese state Victim: European research universities | European research universities

Key Point:

EU member states recommend closer collaboration between research universities and intelligence agencies to safeguard research from theft by hostile states.…
Read More

In the ever-evolving landscape of cybersecurity threats, new groups like Hunt3r Kill3rs emerge with claims of disruptive capabilities. This analysis aims to provide an initial understanding of their activities, considering the limited timeframe and absence of concrete evidence substantiating their claims.

Hunt3r Kill3rs’ logo

Overview of Hunt3r Kill3rs:

Hunt3r Kill3rs, a recently surfaced threat group, assert their prowess in cyber operations, including Industrial Control Systems (ICS) breaches, communication network intrusions, and web application vulnerabilities exploitation.…

Read More

As organizations prepare for the challenges and opportunities of 2024, the critical importance of cybersecurity preparedness is increasingly apparent. In an era characterized by rapid digital transformation and continuous innovation, cyber threats are becoming more sophisticated and frequent, presenting substantial risks to businesses across all sectors.…

Read More