Imagine being a developer who’s building the next-gen crypto app by using popular open source components to speed up coding. Instead, you end up including a package in your build that, does accomplish what you are trying to, but additionally steals cryptocurrency on any system that it’s installed on.…
Tag: RUSSIA
The 2024 Paris Olympic Games face numerous threats due to their high-profile nature and international significance. Insikt Group's research identifies several key risks: cybercriminals targeting critical sectors with ransomware, hacktivists aiming to disrupt due to geopolitical conflicts, and state actors engaging in espionage and influence operations.…
Threat Actor: GlorySec | GlorySec Victim: City of Saint Petersburg | City of Saint Petersburg Price: Not specified Exfiltrated Data Type: Small databases
Additional Information:
GlorySec has announced a strategic shift in their operations, focusing primarily on Russia. The group has successfully breached and posted several small databases from the city of Saint Petersburg.…Summary: NATO allies are being urged to allow their militaries to be proactive in cyberspace to prevent cyberattacks that could disrupt the deployment of forces during a conflict, according to Christian-Marc Lifländer, the head of NATO’s cyber and hybrid policy section.
Threat Actor: Russia | Russia Victim: NATO | NATO
Key Point:
NATO allies need to adopt a proactive approach in cyberspace to prevent cyberattacks that could disrupt military operations during conflicts.…Between 27 and 29 May 2024, international law enforcement agencies and partners conducted the Operation Endgame to disrupt criminal services, notably through taking down key botnet infrastructures, including those of IcedID, SystemBC, PikaBot, SmokeLoader and BumbleBee.
The Sekoia TDR team supported the French law enforcement agencies by providing valuable cyber threat intelligence, in particular on PikaBot.…
Summary: Independent journalists and opposition activists in Europe, who have faced threats from Russia or Belarus, have been targeted or infected with the Pegasus spyware.
Threat Actor: NSO Group | NSO Group Victim: Independent journalists and opposition activists in Europe | Independent journalists and opposition activists in Europe
Key Point :
At least seven Russian and Belarusian-speaking independent journalists and opposition activists in Europe have been targeted or infected with the Pegasus spyware.…Summary: OpenAI has reported that threat actors linked to the governments of Russia, China, and Iran have used its tools for influence operations, generating various types of content including articles, social media posts, and fake comments.
Threat Actor: Governments of Russia, China, and Iran | Governments of Russia, China, and Iran Victim: OpenAI | OpenAI
Key Point :
Threat actors from Russia, China, and Iran have utilized OpenAI’s tools for conducting influence operations.…Summary: Russian threat actors are using cyberattacks to destabilize countries supporting Ukraine, according to U.S. cyber ambassador Nathaniel Fick, who emphasized the need for digital solidarity among the U.S. and EU to protect against common threats.
Threat Actor: Russian threat actors | Russian threat actors Victim: Countries supporting Ukraine | Countries supporting Ukraine
Key Point:
Russian threat actors are using cyberattacks to destabilize countries supporting Ukraine and sow fear and discord.…Summary: Unknown threat actors targeted and disabled over 600,000 routers belonging to a single ISP, rendering them permanently inoperable and requiring hardware replacements.
Threat Actor: Unknown threat actors | Unknown threat actors Victim: Single ISP | Single ISP
Key Point :
Over 600,000 routers belonging to a single ISP were targeted and disabled by unknown threat actors.…Summary: Cloudflare’s threat intel team has stopped a month-long phishing and espionage attack targeting Ukraine, attributed to the Russia-aligned gang FlyingYeti, which aimed to exploit financially vulnerable citizens who had benefited from a government moratorium on evictions and utility disconnections for unpaid debt.
Threat Actor: FlyingYeti | FlyingYeti Victim: Financially strapped citizens in Ukraine | Ukraine
Key Point :
FlyingYeti, a Russia-aligned gang, launched a phishing and espionage attack targeting financially vulnerable citizens in Ukraine who had benefited from a government moratorium on evictions and utility disconnections for unpaid debt.…Intel-Ops researchers recently discovered that the 8Base Ransomware Group has been using Phobos ransomware to infect their targets’ networks. 8Base has reportedly been active since mid-2023.
The Phobos operators have been selling the ransomware’s multiple variants (e.g., Eking, Eight, Elbie, Devos and Faust) via the ransomware-as-a-service (RaaS) model.…
CryptoChameleon is a phishing kit first discovered in February 2024. As of publication, the identity of CryptoChameleon’s creator remains elusive.
The kit is used by unknown threat actors to harvest usernames, passwords, password reset URLs, and photo IDs from employees and customers’ mobile devices.
Silent Push Threat Analysts have conducted a wide-ranging research campaign that has revealed a large amount of CryptoChameleon fast flux Indicators of Future Attack (IOFAs) targeting Binance, Coinbase and FCC users, and a host of other platforms, including:
Apple iCloud Google Gemini Kraken Gamdom Ledger Swan Bitcoin Trezor Hardware Wallet Uphold Nexo Crypto Shake Pay CryptoBackgroundOn 6th February 2024, Silent Push analysts noticed malicious activity targeting the FCC, and reported it confidentially to CISA.…
Cloudforce One is publishing the results of our investigation and real-time effort to detect, deny, degrade, disrupt, and delay threat activity by the Russia-aligned threat actor FlyingYeti during their latest phishing campaign targeting Ukraine. At the onset of Russia’s invasion of Ukraine on February 24, 2022, Ukraine introduced a moratorium on evictions and termination of utility services for unpaid debt.…
Estimated reading time: 5 minutes
AsukaStealer, marketed on a Russian-language cybercrime forum by the alias ‘breakcore,’ has been exposed. The perpetrator offers its services for a monthly fee of $80, targeting individuals and organizations seeking to exploit its capabilities for malicious purposes.Written in C++, AsukaStealer features customizable configurations and an intuitive web-based interface, enhancing its usability for cybercriminals seeking to deploy and manage malware efficiently.It…
Published On : 2024-05-29
EXECUTIVE SUMMARYA critical vulnerability, identified as CVE-2024-3273, has been discovered in certain end-of-life (EOL) D-Link NAS devices, presenting a severe threat due to the lack of ongoing support and their high susceptibility to attacks. With a CVSS base score of 9.8, this vulnerability is extremely serious, potentially allowing unauthorized access, data theft, system modifications, or denial of service attacks.…
Summary: Over 50% of IP addresses owned by federal agencies will have enhanced data routing security measures in place by the end of the year to prevent hackers from hijacking digital pathways into government networks.
Threat Actor: Hackers | hackers Victim: Federal agencies | federal agencies
Key Point :
Over 50% of IP addresses owned by federal agencies will have enhanced data routing security measures in place by the end of the year.…Summary: This article discusses the emergence of a new Internet hosting firm called Stark Industries Solutions, which is being used as a global proxy network for cyberattacks and disinformation campaigns against enemies of Russia.
Threat Actor: NoName057(16) | NoName057(16) Victim: Government and commercial targets in Ukraine and Europe | Ukraine
Key Point:
A large Internet hosting firm called Stark Industries Solutions has emerged as a global proxy network used for cyberattacks and disinformation campaigns.…Summary: The content discusses the need for European research universities to collaborate with intelligence agencies to protect their research from being stolen by hostile states, particularly in sensitive technology areas.
Threat Actor: Chinese state | Chinese state Victim: European research universities | European research universities
Key Point:
EU member states recommend closer collaboration between research universities and intelligence agencies to safeguard research from theft by hostile states.…In the ever-evolving landscape of cybersecurity threats, new groups like Hunt3r Kill3rs emerge with claims of disruptive capabilities. This analysis aims to provide an initial understanding of their activities, considering the limited timeframe and absence of concrete evidence substantiating their claims.
Hunt3r Kill3rs’ logo
Overview of Hunt3r Kill3rs:Hunt3r Kill3rs, a recently surfaced threat group, assert their prowess in cyber operations, including Industrial Control Systems (ICS) breaches, communication network intrusions, and web application vulnerabilities exploitation.…
As organizations prepare for the challenges and opportunities of 2024, the critical importance of cybersecurity preparedness is increasingly apparent. In an era characterized by rapid digital transformation and continuous innovation, cyber threats are becoming more sophisticated and frequent, presenting substantial risks to businesses across all sectors.…