Summary: OpenAI has reported that threat actors linked to the governments of Russia, China, and Iran have used its tools for influence operations, generating various types of content including articles, social media posts, and fake comments.

Threat Actor: Governments of Russia, China, and Iran | Governments of Russia, China, and Iran Victim: OpenAI | OpenAI

Key Point :

Threat actors from Russia, China, and Iran have utilized OpenAI’s tools for conducting influence operations.…
Read More

Summary: Russian threat actors are using cyberattacks to destabilize countries supporting Ukraine, according to U.S. cyber ambassador Nathaniel Fick, who emphasized the need for digital solidarity among the U.S. and EU to protect against common threats.

Threat Actor: Russian threat actors | Russian threat actors Victim: Countries supporting Ukraine | Countries supporting Ukraine

Key Point:

Russian threat actors are using cyberattacks to destabilize countries supporting Ukraine and sow fear and discord.…
Read More

Summary: Cloudflare’s threat intel team has stopped a month-long phishing and espionage attack targeting Ukraine, attributed to the Russia-aligned gang FlyingYeti, which aimed to exploit financially vulnerable citizens who had benefited from a government moratorium on evictions and utility disconnections for unpaid debt.

Threat Actor: FlyingYeti | FlyingYeti Victim: Financially strapped citizens in Ukraine | Ukraine

Key Point :

FlyingYeti, a Russia-aligned gang, launched a phishing and espionage attack targeting financially vulnerable citizens in Ukraine who had benefited from a government moratorium on evictions and utility disconnections for unpaid debt.…
Read More

CryptoChameleon is a phishing kit first discovered in February 2024. As of publication, the identity of CryptoChameleon’s creator remains elusive.

The kit is used by unknown threat actors to harvest usernames, passwords, password reset URLs, and photo IDs from employees and customers’ mobile devices.

Silent Push Threat Analysts have conducted a wide-ranging research campaign that has revealed a large amount of CryptoChameleon fast flux Indicators of Future Attack (IOFAs) targeting Binance, Coinbase and FCC users, and a host of other platforms, including:

Apple iCloud Google Gemini Kraken Gamdom Ledger Swan Bitcoin Trezor Hardware Wallet Uphold Nexo Crypto Shake Pay CryptoBackground

On 6th February 2024, Silent Push analysts noticed malicious activity targeting the FCC, and reported it confidentially to CISA.…

Read More

Cloudforce One is publishing the results of our investigation and real-time effort to detect, deny, degrade, disrupt, and delay threat activity by the Russia-aligned threat actor FlyingYeti during their latest phishing campaign targeting Ukraine. At the onset of Russia’s invasion of Ukraine on February 24, 2022, Ukraine introduced a moratorium on evictions and termination of utility services for unpaid debt.…

Read More

Estimated reading time: 5 minutes

AsukaStealer, marketed on a Russian-language cybercrime forum by the alias ‘breakcore,’ has been exposed. The perpetrator offers its services for a monthly fee of $80, targeting individuals and organizations seeking to exploit its capabilities for malicious purposes.Written in C++, AsukaStealer features customizable configurations and an intuitive web-based interface, enhancing its usability for cybercriminals seeking to deploy and manage malware efficiently.It…

Read More

Published On : 2024-05-29

EXECUTIVE SUMMARY

A critical vulnerability, identified as CVE-2024-3273, has been discovered in certain end-of-life (EOL) D-Link NAS devices, presenting a severe threat due to the lack of ongoing support and their high susceptibility to attacks. With a CVSS base score of 9.8, this vulnerability is extremely serious, potentially allowing unauthorized access, data theft, system modifications, or denial of service attacks.…

Read More

Summary: Over 50% of IP addresses owned by federal agencies will have enhanced data routing security measures in place by the end of the year to prevent hackers from hijacking digital pathways into government networks.

Threat Actor: Hackers | hackers Victim: Federal agencies | federal agencies

Key Point :

Over 50% of IP addresses owned by federal agencies will have enhanced data routing security measures in place by the end of the year.…
Read More

Summary: This article discusses the emergence of a new Internet hosting firm called Stark Industries Solutions, which is being used as a global proxy network for cyberattacks and disinformation campaigns against enemies of Russia.

Threat Actor: NoName057(16) | NoName057(16) Victim: Government and commercial targets in Ukraine and Europe | Ukraine

Key Point:

A large Internet hosting firm called Stark Industries Solutions has emerged as a global proxy network used for cyberattacks and disinformation campaigns.…
Read More

Summary: The content discusses the need for European research universities to collaborate with intelligence agencies to protect their research from being stolen by hostile states, particularly in sensitive technology areas.

Threat Actor: Chinese state | Chinese state Victim: European research universities | European research universities

Key Point:

EU member states recommend closer collaboration between research universities and intelligence agencies to safeguard research from theft by hostile states.…
Read More

In the ever-evolving landscape of cybersecurity threats, new groups like Hunt3r Kill3rs emerge with claims of disruptive capabilities. This analysis aims to provide an initial understanding of their activities, considering the limited timeframe and absence of concrete evidence substantiating their claims.

Hunt3r Kill3rs’ logo

Overview of Hunt3r Kill3rs:

Hunt3r Kill3rs, a recently surfaced threat group, assert their prowess in cyber operations, including Industrial Control Systems (ICS) breaches, communication network intrusions, and web application vulnerabilities exploitation.…

Read More

As organizations prepare for the challenges and opportunities of 2024, the critical importance of cybersecurity preparedness is increasingly apparent. In an era characterized by rapid digital transformation and continuous innovation, cyber threats are becoming more sophisticated and frequent, presenting substantial risks to businesses across all sectors.…

Read More
Introduction

In November 2023, the team at the Positive Technologies Expert Security Center (PT ESC) released their first research report on attacks by the hitherto-unknown group Hellhounds on Russian companies’ infrastructure: Operation Lahat. The report focused on the group’s attacks on Linux hosts that relied on a new backdoor known as Decoy Dog. Hellhounds carried on attacks on organizations located in Russia, scoring at least 48 confirmed victims by Q2 2024.…

Read More

Threat Actor: NoName057 Group | NoName057 Group Victim: German Federal Ministry of Justice, German Federal Ministry of Transport and Digital Infrastructure, Federal Office of Logistics and Mobility, German Customs Administration | German Federal Ministry of Justice, German Federal Ministry of Transport and Digital Infrastructure, Federal Office of Logistics and Mobility, German Customs Administration Price: Not specified Exfiltrated Data Type: Not specified

Additional Information:

NoName057 Group has claimed responsibility for a series of DDoS attacks on various German federal institutions.…
Read More

Summary: The Environmental Protection Agency (EPA) has reported that over 70% of water systems in the US fail to meet security standards, making them vulnerable to cyberattacks that can disrupt water sanitation and wastewater systems nationwide.

Threat Actor: Cybercriminals | Cybercriminals Victim: Water systems in the US | Water systems in the US

Key Point :

Over 70% of water systems in the US fail to meet security standards set by the EPA, exposing them to potential cyberattacks.…
Read More

This report was originally published for our customers on 14 May 2024.

Executive summaryThe DoppelGänger campaign is an ongoing influence campaign, starting from May 2022 and attributed to the Structura National Technologies (Structura) and the Social Design Agency (SDA), which are two Russian entities. The primary goal of DoppelGänger is to diminish support for Ukraine in the wake of Russian aggression and to foster divisions within nations backing Ukraine.…
Read More

Summary: The cryptojacking group known as Kinsing has been actively orchestrating illicit cryptocurrency mining campaigns since 2019, continuously evolving and adapting by integrating newly disclosed vulnerabilities to expand its botnet.

Threat Actor: Kinsing | Kinsing Victim: Various victims | Kinsing victim

Key Point :

Kinsing, also known as H2Miner, is a cryptojacking group that has consistently expanded its toolkit with new exploits to enroll infected systems in a crypto-mining botnet.…
Read More