Messages récents

Pages: 1 [2] 3 4 5 6 7 8 9 10
11
News / [FireEye]APT37 (Reaper): The Overlooked North Korean Actor
« Dernier message par igor51 le Hier à 17:00:41 »
APT37 (Reaper): The Overlooked North Korean Actor

[html]

On Feb. 2, 2018, we published a     href="https://www.fireeye.com/blog/threat-research/2018/02/attacks-leveraging-adobe-zero-day.html">blog
    detailing the use of

12
News / [Eset]Cybercrime weighs most heavily on financial service firms
« Dernier message par igor51 le Hier à 17:00:26 »
Cybercrime weighs most heavily on financial service firms

A further breakdown of the overall figures shows that, in all, the actual cost hinges on a number of variables. The factors that enter heavily into the equation include attack types and their frequency, along with the organization’s size and even the country in which an organization is based.
The post Cybercrime weighs most heavily on financial service firms appeared first on WeLiveSecurity

Source: Cybercrime weighs most heavily on financial service firms
13
News / [Sophos]Facebook to verify election ad buyers by snail mail
« Dernier message par igor51 le Hier à 17:00:26 »
Facebook to verify election ad buyers by snail mail

The plan came a day after a federal indictment describing a Russian conspiracy to interfere in the 2016 election.
Source: Facebook to verify election ad buyers by snail mail
14
News / [AVAST]AntiTrack Premium stops trackers in their tracks
« Dernier message par igor51 le Hier à 17:00:25 »
AntiTrack Premium stops trackers in their tracks

It’s easy to buy into the notion that once you wander outside the borders of social media, the internet is an untamed wilderness of anonymity. After all, you don’t use your real name when posting on Reddit or YouTube, do you? The record of your movements through even the tawdriest corners of the web is wiped out of existence as long as you clear your browser history, isn’t it?


Source: AntiTrack Premium stops trackers in their tracks
15
Apple fixes that “1 character to crash your Mac and iPhone” bug

Given the ease of copying and pasting the treacherous "crash character" into a message, Apple needed to get a patch out quickly.
Source: Apple fixes that “1 character to crash your Mac and iPhone” bug
16
News / [FireEye]APT37 (Reaper): The Overlooked North Korean Actor
« Dernier message par igor51 le Hier à 15:00:24 »
APT37 (Reaper): The Overlooked North Korean Actor

On Feb. 2, 2018, we published a     href="https://www.fireeye.com/blog/threat-research/2018/02/attacks-leveraging-adobe-zero-day.html">blog
    detailing the use of an Adobe Flash zero-day
  vulnerability (CVE-2018-4878) by a suspected North Korean cyber
  espionage group that we now track as APT37 (Reaper).


 

Our analysis of APT37’s recent activity reveals that the group’s
  operations are expanding in scope and sophistication, with a toolset
  that includes access to zero-day vulnerabilities and wiper malware. We
  assess with high confidence that this activity is carried out on
  behalf of the North Korean government given malware development
  artifacts and targeting that aligns with North Korean state interests.
  FireEye iSIGHT Intelligence believes that APT37 is aligned with the
  activity publicly reported as   href="https://cdn.securelist.com/files/2017/10/Guerrero-Saade-Raiu-VB2017.pdf">Scarcruft
  and Group123.


 

Download our report,
          href="https://www2.fireeye.com/rs/848-DID-242/images/rpt_APT37.pdf">APT37
      (Reaper): North Korean Cyber Espionage Group Expands its Focus and
  Capabilities
, to learn more about our assessment that this
  threat actor is working on behalf of the North Korean government, as
  well as various other details about their operations:


 

  •     Targeting: Primarily South Korea – though also Japan, Vietnam
        and the Middle East – in various industry verticals, including
        chemicals, electronics, manufacturing, aerospace, automotive, and
      healthcare.

  •     Initial Infection Tactics: Social engineering tactics
        tailored specifically to desired targets, strategic web compromises
        typical of targeted cyber espionage operations, and the use of
        torrent file-sharing sites to distribute malware more
      indiscriminately.

  •     Exploited Vulnerabilities: Frequent exploitation of
        vulnerabilities in Hangul Word Processor (HWP), as well as Adobe
        Flash. The group has demonstrated access to zero-day vulnerabilities
        (CVE-2018-0802), and the ability to incorporate them into
      operations.

  •     Command and Control Infrastructure: Compromised servers,
        messaging platforms, and cloud service providers to avoid detection.
        The group has shown increasing sophistication by improving their
        operational security over time.

  •     Malware: A diverse suite of malware for initial intrusion and
        exfiltration. Along with custom malware used for espionage purposes,
        APT37 also has access to destructive malware.

 

More information on this threat actor is found in our report,
          href="https://www2.fireeye.com/rs/848-DID-242/images/rpt_APT37.pdf">APT37
      (Reaper): North Korean Cyber Espionage Group Expands its Focus and
  Capabilities
. You can also     href="https://www2.fireeye.com/WBNR-APT37-Overlooked-North-Korean-Threat.html">register
    for our upcoming webinar for additional insights into this group.


Source: APT37 (Reaper): The Overlooked North Korean Actor
17
News / [SecList]A Slice of 2017 Sofacy Activity
« Dernier message par igor51 le Hier à 15:00:21 »
A Slice of 2017 Sofacy Activity

Sofacy, also known as APT28, Fancy Bear, and Tsar Team, is a highly active and prolific APT. From their high volume 0day deployment to their innovative and broad malware set, Sofacy is one of the top groups that we monitor, report, and protect against. 2017 was not any different in this regard.
Source: A Slice of 2017 Sofacy Activity
18
News / [Sophos]Broadband network plagued by wheezy old cryptomining gadget
« Dernier message par igor51 le Hier à 15:00:08 »
Broadband network plagued by wheezy old cryptomining gadget

The geriatric Bitcoin miner breathed out "spurious emissions" that befogged T-Mobile's broadband network in Brooklyn
Source: Broadband network plagued by wheezy old cryptomining gadget
19
News / [Sophos]Facebook told to stop tracking users that aren’t logged in
« Dernier message par igor51 le Hier à 14:00:05 »
Facebook told to stop tracking users that aren’t logged in

If Facebook doesn't stop tracking users across the web, it could face a fine of €250,000 ($315,000) per day, says Belgian court.
Source: Facebook told to stop tracking users that aren’t logged in
20
News / [kreb]Money Laundering Via Author Impersonation on Amazon?
« Dernier message par igor51 le Hier à 13:00:09 »
Money Laundering Via Author Impersonation on Amazon?

Patrick Reames had no idea why Amazon.com sent him a 1099 form saying he'd made almost $24,000 selling books via Createspace, the company's on-demand publishing arm. That is, until he searched the site for his name and discovered someone has been using it to peddle a $555 book that's full of nothing but gibberish.
Source: Money Laundering Via Author Impersonation on Amazon?
Pages: 1 [2] 3 4 5 6 7 8 9 10