6 C
London
Tuesday, November 21, 2017
Home Tags Cyber Espionage

Tag: Cyber Espionage

F-35 Joint Program Office acknowledges breach, says no classified data was stolen.
We're already used to the fact that complex cyberattacks use 0-day vulnerabilities, bypassing digital signature checks, virtual file systems, non-standard encryption algorithms and other tricks.
Sometimes, however, all of this may be done in much simpler ways, as was the case in the malicious campaign that we detected a while ago – we named it 'Microcin' after microini, one of the malicious components used in it.

IT threat evolution Q2 2017

The threat from ransomware continues to grow.

Between April 2016 and March 2017, we blocked ransomware on the computers of 2,581,026 Kaspersky Lab customers.
In May, we saw the biggest ransomware epidemic in history, called WannaCry.

APT Trends report Q2 2017

Since 2014, Kaspersky Labrsquo;s Global Research and Analysis Team (GReAT) has been providing threat intelligence reports to a wide-range of customers worldwide, leading to the delivery of a full and dedicated private reporting service. Prior to the new service offering, GReAT published research online for the general public in an effort to help combat the ever-increasing threat from nation-state and other advanced actors.
Today, a dangerous new trend is emerging: steganography is increasingly being used by actors creating malware and cyber-espionage tools. Most modern anti-malware solutions provide little, if any, protection from steganography, while any carrier in which a payload can be secretly carried poses a potential threat.
CopyKittens persistent but easy to find, monitor and counter Security researchers have lifted the lid on a new cyber-espionage crew that has targeted the German Bundestag and Turkish diplomats.…
Move demotes US cyber diplomats as part of department overhaul.
Former MI5 chief says cyber-espionage and the balance between security and privacy means 'we're facing a very difficult world'.
Spies, bank raiders gravitate to growing stealth technique A newly uncovered cyber-espionage campaign targeting Israeli organisations relies on "fileless" malware hidden in Microsoft Word documents, a hacker tactic that's becoming a growing menace.…
Spies, bank raiders gravitate to growing stealth technique A newly uncovered cyber-espionage campaign targeting Israeli organisations relies on "fileless" malware, a hacker tactic that's becoming a growing menace.…
Deployment of THAAD upsets China, seen as espionage tool.
Gosh, this is awkward...

Evidence of Chinese cyber-espionage against the US has been uncovered on the eve of an important Sino-US presidential summit.…