article thumbnail

Platinum APT and leverages steganography to hide C2 communications

Security Affairs

According to Microsoft, the Platinum has been active since at least 2009, it was responsible for spear phishing attacks on ISPs, government organizations, intelligence agencies, and defense institutes. The analysis of the encrypted files used in the second stage revealed a previously undiscovered backdoor associated with the Platinum group.

article thumbnail

Encryption: How It Works, Types, and the Quantum Future

eSecurity Planet

Encryption and the development of cryptography have been a cornerstone of IT security for decades and remain critical for data protection against evolving threats. While cryptology is thousands of years old, modern cryptography took off in the 1970s with the help of the Diffie-Hellman-Merkle and RSA encryption algorithms.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Platinum APT group adds the Titanium backdoor to its arsenal

Security Affairs

According to Microsoft, the Platinum has been active since at least 2009, it was responsible for spear phishing attacks on ISPs, government organizations, intelligence agencies, and defense institutes. “ BITS Downloader – This component is used to download encrypted files from the C&C server then decrypt and launch them.”

IT 53
article thumbnail

Latest Turla backdoor leverages email PDF attachments as C&C mechanism

Security Affairs

. “These organizations are the latest known additions to the list of victims of this APT group that has been targeting governments, state officials, diplomats, and military authorities since at least 2008.” ” The Turla backdoor has been used since at least 2009 and was continuously improved across the years.

article thumbnail

New European Union Dual-Use Regulation Enters Into Force

Data Matters

As from September 9, 2021, Regulation (EU) 2021/821 ( EU Dual-Use Regulation Recast ) replaces the existing Council Regulation (EC) 428/2009 setting up the European Union (EU) regime for the control of exports, transfer, brokering, and transit of “dual-use” items ( EU Dual-Use Regulation ). New controls on technical assistance.

article thumbnail

Weekly podcast: 2018 end-of-year roundup

IT Governance

In August, Yale University announced that it had discovered a log revealing a ten-year-old data breach on its systems , in which personal information relating to people affiliated with the university before February 2009 was compromised. Information including their names, email addresses, and encrypted passwords may have been compromised.

article thumbnail

MY TAKE: Rising geopolitical tensions suggest a dire need for tighter cybersecurity in 2024

The Last Watchdog

and Israel, 2005 – 2010,) Operation Aurora (China, 2009,) the Sony Pictures hack (North Korea, 2015,) and WannaCry (North Korea, 2017.) The good news is that AI is coming into play across the board — in cybersecurity innovations to harden software code, manage cloud access and even make encryption more flexible and resilient.