Click any tag below to further narrow down your results
Links
The article discusses the "Premier Pass-as-a-Service" model, highlighting the collaboration between China-aligned APT groups Earth Estries and Earth Naga. This partnership complicates detection and attribution of cyberattacks, as the two groups share access to compromised assets, targeting critical sectors across various regions.
Chinese hackers known as Bronze Butler exploited a critical vulnerability in Motex Lanscope Endpoint Manager to deploy their Gokcpdoor malware. This flaw, CVE-2025-61932, allowed them to execute arbitrary code on affected systems, leading to data theft. Organizations are urged to patch the vulnerability as no workarounds exist.
A cyber-espionage group linked to Hamas, known as Ashen Lepus, is using new malware called AshTag to target government and diplomatic offices in the Middle East. Their tactics involve disguising malicious files as benign documents related to geopolitical issues, allowing them to steal sensitive information undetected.
Transparent Tribe, a hacking group linked to Pakistan, has targeted Indian government and academic sectors with a new remote access trojan (RAT). The attacks utilize weaponized files disguised as PDFs and adapt their methods based on the antivirus software present on infected systems. Recent activity also includes a campaign using malicious shortcuts to deliver additional payloads for long-term access.
A new cyber espionage campaign named "Blind Eagle" has been linked to the Russian group known as Proton66, targeting organizations in Latin America. The attacks primarily focus on stealing sensitive information using sophisticated malware and phishing techniques to compromise victim systems. Experts warn that this campaign illustrates the increasing threat posed by state-sponsored actors in the region.
North Korean threat actor UNC5342 has begun using a technique called EtherHiding to deliver malware and steal cryptocurrency, marking a significant evolution in nation-state cyber threats. This method involves embedding malicious JavaScript within smart contracts on public blockchains, allowing attackers to retrieve payloads stealthily and without leaving a trace. The ongoing social engineering campaign targets developers with fake job offers to facilitate these attacks.
Phantom Taurus is a newly identified Chinese nation-state actor focused on espionage against government and telecommunications organizations in Africa, the Middle East, and Asia. Their operations are characterized by unique tactics and the use of a new malware suite called NET-STAR, which demonstrates advanced evasion techniques and a shift towards direct database targeting for information extraction.