APT28 Pulls Out New Malware Cannon

APT28 Pulls Out New Malware Cannon

The notorious Russian cyberespionage group known as APT28, Fancy Bear and Sofacy is targeting government organizations using a new Trojan program called Cannon. Researchers from Palo Alto Networks detected new spear-phishing campaigns ...
Security Boulevard
Dark Side Quantum Computing

Russian Hacker Group APT28 Used UEFI Rootkit on Select Targets

Security researchers have found malicious versions of the LoJack anti-theft software on computers belonging to government agencies from the Balkans and Central and Eastern Europe. They attribute the attacks to the a ...
Security Boulevard

8/27/19 – Dtex, Insider Threat, Privacy News: Microsoft APT28 Shut Downs Highlight Insider Threat Risks, Tech Heavyweights Seek to Sidestep California Privacy Law

Last week, Microsoft reported that it detected six internet domains that were set up by cyberattack groups associated with the Russian government. According to Microsoft: Last Week, Microsoft’s Digital Crimes Unit (DCU) ...
Security Boulevard’s 5 Most Read Stories for the Week

Security Boulevard’s 5 Most Read Stories for the Week, August 20-24

A new week, a new crop of security stories. Last week, malware complacency, Russian cyberspies, GDPR compliance and Mirai IoT malware made the headlines. In addition, we analyzed top security threats for ...
Security Boulevard
Pre-Internet Vulnerability Levels

Microsoft Seizes Domains Set Up by Russian Cyberspies

Microsoft has seized six domains that were registered by Russian cyberespionage group Fancy Bear and mimicked the websites of U.S. political organizations and think tanks. “One appears to mimic the domain of ...
Security Boulevard
Microsoft Seized Six Fake Domains Mimicking U.S. Political Organizations

Microsoft Seized Six Fake Domains Mimicking U.S. Political Organizations

Microsoft seized six fake domains that mimic the websites of prominent political organizations located in the United States. On 20 August, the Redmond-based tech giant revealed that its Digital Crimes Unit (DCU) ...
Olympic Destroyer Moves from Pyeongchang to Europe and Russia

Olympic Destroyer Moves from Pyeongchang to Europe and Russia

Olympic Destroyer, the threat actor that targeted the 2018 Winter Olympics in Pyeongchang, South Korea, has launched new attacks against organizations from Russia, Ukraine and several other European countries. To sabotage the ...
Security Boulevard
Adobe Fixes Flash Player

Hacker Group Targeting Industrial Controllers Expands Its Operations

The group behind the Triton malware that triggered an emergency shutdown last year at a critical infrastructure organization in the Middle East is still active and has expanded its operations to industrial ...
Security Boulevard
Anti-theft LoJack supposedly manipulated by Russian hackers to hijack computers

Anti-theft LoJack supposedly manipulated by Russian hackers to hijack computers

Security researchers from Arbor Networks’ ASERT lab have found that laptop recovery software LoJack appears to be used in a sophisticated, yet subtle, Russian state-sponsored attack scheme through remote code execution. The ...
Cyberespionage Group Abuses LoJack Theft Recovery Software

Cyberespionage Group Abuses LoJack Theft Recovery Software

Security researchers have found instances of the Absolute LoJack theft recovery technology phoning back to servers associated with a notorious Russian cyberespionage group known as Fancy Bear. Absolute LoJack, previously known as ...
Security Boulevard
Loading...