Google Chrome 91 0 4472 101 update fixes 0-day vulnerability - gizchina.com - get the latest breaking news, showbiz & celebrity photos, sport news & rumours, viral videos and top stories from gizchina.com Daily Mail and Mail on Sunday newspapers.
Google says North Korea hackers targeting researchers are back
Updated:
Updated:
April 02, 2021 15:18 IST
The new website for the fake company, dubbed “SecuriElite”, claims to be located in Turkey and offers pentests, software security assessments, and exploits.
Share Article
Google says North Korea hackers targeting researchers are back.
| Photo Credit: Special Arrangement
The new website for the fake company, dubbed “SecuriElite”, claims to be located in Turkey and offers pentests, software security assessments, and exploits.
(Subscribe to our Today s Cache newsletter for a quick snapshot of top 5 tech stories. Click here to subscribe for free.)
Hackers backed by the North-Korean government who targeted researchers in January have resurfaced this month with a fake offensive security company and social media profiles, Google has said in a blog post.
Lazarus, advanced persistent threat group, targets the defense industry ilonggotechblog.com - get the latest breaking news, showbiz & celebrity photos, sport news & rumours, viral videos and top stories from ilonggotechblog.com Daily Mail and Mail on Sunday newspapers.
Mar 2, 2021
Kaspersky researchers have identified a new, previously unknown, campaign from Lazarus, a highly prolific advanced threat actor active since at least 2009 that has been linked to a number of multifaceted campaigns.
Since early 2020, it has been targeting the defense industry with a custom backdoor dubbed ThreatNeedle. The backdoor moves laterally through infected networks gathering sensitive information.
Lazarus is one of today’s most prolific threat actors. Active since at least 2009, Lazarus has been involved in large-scale cyberespionage campaigns, ransomware campaigns, and even attacks against the cryptocurrency market. While the past few years they’ve been focusing on financial institutions, at the beginning of 2020, it appears they have added the defense industry to their “portfolio”.
Before this most recent campaign, the hackers have been involved in other large-scale cyberespionage campaigns, ransomware campaigns, and even attacks against the cryptocurrency market. These latest attacks signal a change in direction.
Researchers said they became aware of this campaign when they were called in to assist with incident response and discovered the organization had fallen victim to the ThreatNeedle backdoor.
The initial infection occurs through spear-phishing, in which targets receive emails with malicious Word attachments or links to them hosted on company servers. These emails claim to have urgent updates on the coronavirus pandemic and appear to come from a respected medical center.