article thumbnail

China-linked APT41 group targets Hong Kong with Spyder Loader

Security Affairs

Winnti (aka APT41 , Axiom, Barium , Blackfly) is a cyberespionage group that has been active since at least 2007. ” reads the analysis published by Symantec. Spyder Loader loads AES-encrypted blobs to create the wlbsctrl.dll which acts as a next-stage loader that executes the content.

article thumbnail

Sophos linked Entropy ransomware to Dridex malware. Are both linked to Evil Corp?

Security Affairs

The forensic analysis conducted by researchers revealed the presence of multiple instances of the general-purpose Dridex malware which was also used to distribute other malware. In a first stage it allocates the memory space where to copy the encrypted data and whose content is executed by the packer. ” continues the report.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Dacls RAT, the first Lazarus malware that targets Linux devices

Security Affairs

This threat actor has been active since at least 2009, possibly as early as 2007, and it was involved in both cyber espionage campaigns and sabotage activities aimed to destroy data and disrupt systems. ” reads the analysis published by Qihoo 360 Netlab. ” continues the analysis.

CMS 72
article thumbnail

North Korea-linked group Lazarus targets Latin American banks

Security Affairs

This threat actor has been active since at least 2009, possibly as early as 2007, and it was involved in both cyber espionage campaigns and sabotage activities aimed to destroy data and disrupt systems. ” reads the analysis published by Trend Micro. n = number of characters in the loader dll’s filename.

article thumbnail

North Korea-linked Lazarus APT uses a Mac variant of the Dacls RAT

Security Affairs

This threat actor has been active since at least 2009, possibly as early as 2007, and it was involved in both cyber espionage campaigns and sabotage activities aimed to destroy data and disrupt systems. ” reads the analysis published by the researchers. The Mac RAT implements a C&C communication similar to the Linux variant.

article thumbnail

North Korea-linked Lazarus APT hides malicious code within BMP image to avoid detection

Security Affairs

This threat actor has been active since at least 2009, possibly as early as 2007, and it was involved in both cyber espionage campaigns and sabotage activities aimed to destroy data and disrupt systems. ” reads the analysis published by MalwareBytes. ” states the analysis. ” concludes the report.

article thumbnail

Turla APT group adds Topinambour Trojan to its arsenal

Security Affairs

The Turla APT group (aka Snake , Uroburos , Waterbug , Venomous Bear and KRYPTON ) has been active since at least 2007 targeting diplomatic and government organizations and private businesses in the Middle East, Asia, Europe, North and South America and former Soviet bloc nations. ” reads the analysis published by Kaspersky.

IT 67