Operation DreamJob
Lazarus’ key operation – “Operation DreamJob” – continues to evolve with new sophisticated tactics that have persisted for more than five years, according to Kaspersky’s Global Research and Analysis Team.
Complexity of operations
Since 2023, Earth Estries has evolved into one of the most aggressive Chinese advanced persistent threat (APT) groups, primarily targeting critical industries such as telecommunications companies and government agencies in the US, Asia-Pacific, the Middle East and South Africa.
Nearest Neighbor Attack
The Russian hacker group ATP28 has attacked a US company using a new technique called “Nearest Neighbor Attack” and gained remote access to its Wi-Fi network.
Unpatched security vulnerabilities
Several security breaches were observed at companies from different industries in which firewall devices from Palo Alto Network were involved.
8 million downloads
ThreatLabz identified more than 200 malicious apps in the Google Play Store with a total of more than eight million downloads. The Zscaler cloud blocked 45 percent more IoT malware transactions than last year, proving that botnets are on the rise in IoT systems.
Global Mobile Threat Report 2024
Zimperium has published the “Global Mobile Threat Report 2024”.
The security report identifies a significant increase in “mishing” threats (mobile targeted phishing), which use various tactics to exploit user errors and vulnerabilities in mobile devices.
Industrial companies remain a popular target
Industrial companies worldwide continue to be a popular target for cyber criminals, as the latest analysis by Kaspersky ICS CERT for the second quarter of this year shows.
Cooperation with APT Group InvisiMole
ESET has carried out an analysis of the activities of the Russian hacker group Gamaredon, which currently poses the greatest threat to Ukraine in cyberspace.
In the course of the research, it was also discovered that NATO countries such as Bulgaria, Latvia, Lithuania and Poland have been attacked – albeit
Gigabud and Spynote
Zimperium has published new findings on a security-critical malware campaign that combines features of two malicious programs.
Zimperium researchers’ research shows that both Gigabud and Spynote samples are currently being distributed via domains with similar structures and subdomains.
Events
Veranstaltungen
Most read articles.
10. January 2025
30. December 2024