Found 30 bookmarks
Newest
US sanctions APT31 hackers behind critical infrastructure attacks
US sanctions APT31 hackers behind critical infrastructure attacks
The U.S. Treasury Department has sanctioned a Wuhan-based company used by the Chinese Ministry of State Security (MSS) as cover in attacks against U.S. critical infrastructure organizations. #APT31 #China #Computer #Critical #InfoSec #Infrastructure #Sanctions #Security #USA
·bleepingcomputer.com·
US sanctions APT31 hackers behind critical infrastructure attacks
Visualizing QakBot Infrastructure
Visualizing QakBot Infrastructure
This blog post seeks to draw out some high-level trends and anomalies based on our ongoing tracking of QakBot command and control (C2) infrastructure. By looking at the data with a broader scope, we hope to supplement other research into this particular threat family, which in general focuses on specific infrastructure elements; e.g., daily alerting on active C2 servers.
·team-cymru.com·
Visualizing QakBot Infrastructure
Growing cyberattacks on Canada's food system threaten disaster
Growing cyberattacks on Canada's food system threaten disaster
Canada's domestic food production system may actually be one of the most glaring cracks in Canada's national defences. ... Attacking agricultural infrastructure has proven to be an effective part of the Russian playbook so far in its invasion of Ukraine. In June 2022, EU trade counsellor Maud Labat said Moscow has figured out how to wield food as a “geopolitical weapon.”
·financialpost.com·
Growing cyberattacks on Canada's food system threaten disaster
Growing cyberattacks on Canada's food system threaten disaster
Growing cyberattacks on Canada's food system threaten disaster
Canada's domestic food production system may actually be one of the most glaring cracks in Canada's national defences. ... Attacking agricultural infrastructure has proven to be an effective part of the Russian playbook so far in its invasion of Ukraine. In June 2022, EU trade counsellor Maud Labat said Moscow has figured out how to wield food as a “geopolitical weapon.”
·financialpost.com·
Growing cyberattacks on Canada's food system threaten disaster
Darth Vidar: The Dark Side of Evolving Threat Infrastructure
Darth Vidar: The Dark Side of Evolving Threat Infrastructure
Summary Three key takeaways from our analysis of Vidar infrastructure: Russian VPN gateways are potentially providing anonymity for Vidar operators / customers, making it more challenging for analysts to have a complete overview of this threat. These gateways now appear to be migrating to Tor. Vidar operators appear to be expanding their infrastructure, so analysts need to keep them in their sights. We expect a new wave of customers and as a result, an increase of campaigns in the upcoming weeks
·team-cymru.com·
Darth Vidar: The Dark Side of Evolving Threat Infrastructure
Darth Vidar: The Dark Side of Evolving Threat Infrastructure
Darth Vidar: The Dark Side of Evolving Threat Infrastructure
Summary Three key takeaways from our analysis of Vidar infrastructure: Russian VPN gateways are potentially providing anonymity for Vidar operators / customers, making it more challenging for analysts to have a complete overview of this threat. These gateways now appear to be migrating to Tor. Vidar operators appear to be expanding their infrastructure, so analysts need to keep them in their sights. We expect a new wave of customers and as a result, an increase of campaigns in the upcoming weeks
·team-cymru.com·
Darth Vidar: The Dark Side of Evolving Threat Infrastructure
U.S. targeted adversary cyber infrastructure to safeguard midterm vote
U.S. targeted adversary cyber infrastructure to safeguard midterm vote
The U.S. military's Cyber Command hunted down foreign adversaries overseas ahead of this year's mid-term elections, taking down their infrastructure before they could strike, the head of U.S. Cyber Command said. U.S. Army General Paul Nakasone said the cyber effort to secure the vote began before the Nov. 8 vote and carried through until the elections were certified. "We did conduct operations persistently to make sure that our foreign adversaries couldn't utilize infrastructure to impact us," Nakasone, who is also the director of the U.S. National Security Agency, told reporters.
·reuters.com·
U.S. targeted adversary cyber infrastructure to safeguard midterm vote
U.S. targeted adversary cyber infrastructure to safeguard midterm vote
U.S. targeted adversary cyber infrastructure to safeguard midterm vote
The U.S. military's Cyber Command hunted down foreign adversaries overseas ahead of this year's mid-term elections, taking down their infrastructure before they could strike, the head of U.S. Cyber Command said. U.S. Army General Paul Nakasone said the cyber effort to secure the vote began before the Nov. 8 vote and carried through until the elections were certified. "We did conduct operations persistently to make sure that our foreign adversaries couldn't utilize infrastructure to impact us," Nakasone, who is also the director of the U.S. National Security Agency, told reporters.
·reuters.com·
U.S. targeted adversary cyber infrastructure to safeguard midterm vote
When coin miners evolve, Part 1: Exposing LemonDuck and LemonCat, modern mining malware infrastructure
When coin miners evolve, Part 1: Exposing LemonDuck and LemonCat, modern mining malware infrastructure
In this two-part blog series, we expose a modern malware infrastructure and provide guidance for protecting against the wide range of threats it enables. Part 1 covers the evolution of the threat, how it spreads, and how it impacts organizations. Part 2 is a deep dive on the attacker behavior and will provide investigation guidance.
·microsoft.com·
When coin miners evolve, Part 1: Exposing LemonDuck and LemonCat, modern mining malware infrastructure
When coin miners evolve, Part 1: Exposing LemonDuck and LemonCat, modern mining malware infrastructure
When coin miners evolve, Part 1: Exposing LemonDuck and LemonCat, modern mining malware infrastructure
In this two-part blog series, we expose a modern malware infrastructure and provide guidance for protecting against the wide range of threats it enables. Part 1 covers the evolution of the threat, how it spreads, and how it impacts organizations. Part 2 is a deep dive on the attacker behavior and will provide investigation guidance.
·microsoft.com·
When coin miners evolve, Part 1: Exposing LemonDuck and LemonCat, modern mining malware infrastructure
When coin miners evolve, Part 1: Exposing LemonDuck and LemonCat, modern mining malware infrastructure
When coin miners evolve, Part 1: Exposing LemonDuck and LemonCat, modern mining malware infrastructure
In this two-part blog series, we expose a modern malware infrastructure and provide guidance for protecting against the wide range of threats it enables. Part 1 covers the evolution of the threat, how it spreads, and how it impacts organizations. Part 2 is a deep dive on the attacker behavior and will provide investigation guidance.
·microsoft.com·
When coin miners evolve, Part 1: Exposing LemonDuck and LemonCat, modern mining malware infrastructure
Ukrainian cyber resistance group targets Russian power grid, railways
Ukrainian cyber resistance group targets Russian power grid, railways
A Ukrainian cyber guerrilla warfare group plans to launch digital sabotage attacks against critical Russian infrastructure such as railways and the electricity grid, to strike back at Moscow over its invasion, a hacker team coordinator told Reuters.
·reuters.com·
Ukrainian cyber resistance group targets Russian power grid, railways
Ukrainian cyber resistance group targets Russian power grid, railways
Ukrainian cyber resistance group targets Russian power grid, railways
A Ukrainian cyber guerrilla warfare group plans to launch digital sabotage attacks against critical Russian infrastructure such as railways and the electricity grid, to strike back at Moscow over its invasion, a hacker team coordinator told Reuters.
·reuters.com·
Ukrainian cyber resistance group targets Russian power grid, railways
Ukrainian cyber resistance group targets Russian power grid, railways
Ukrainian cyber resistance group targets Russian power grid, railways
A Ukrainian cyber guerrilla warfare group plans to launch digital sabotage attacks against critical Russian infrastructure such as railways and the electricity grid, to strike back at Moscow over its invasion, a hacker team coordinator told Reuters.
·reuters.com·
Ukrainian cyber resistance group targets Russian power grid, railways