article thumbnail

Naikon APT group uses new Nebulae backdoor in attacks aimed at military orgs

Security Affairs

China-linked APT Naikon employed a new backdoor in multiple cyber-espionage operations targeting military organizations from Southeast Asia in the last 2 years. The Naikon APT group mainly focuses on high-profile orgs, including government entities and military orgs. Follow me on Twitter: @securityaffairs and Facebook.

article thumbnail

British Court rejects the US’s request to extradite Julian Assange

Security Affairs

He published thousands of classified diplomatic and military documents on WikiLeaks in 2010. In 2010, Assange gained unauthorized access to a government computer system of a NATO country and years later he contacted s LulzSec leader who was working for the FBI and provided him a list of targets.

Military 130
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Russian spies are attempting to tap transatlantic undersea cables

Security Affairs

Garda and military intelligence agencies believe the Russian agents were sent by the military intelligence branch of the Russian armed forces, the GRU. The GCHQ paid Cable & Wireless more than £5 million ($9 million) as part of an annual lease for GCHQ to access the undersea cables. Source [link].

Military 130
article thumbnail

North Korea ScarCruft APT used previously undetected Dolphin Backdoor against South Korea

Security Affairs

ScarCruft has been active since at least 2012, it made the headlines in early February 2018 when researchers revealed that the APT group leveraged a zero-day vulnerability in Adobe Flash Player to deliver malware to South Korean users. Kaspersky first documented the operations of the group in 2016. ” reads the post published by ESET.

Military 113
article thumbnail

US indicted 4 Russian government employees for attacks on critical infrastructure

Security Affairs

has indicted four Russian government employees for their role in cyberattacks targeting hundreds of companies and organizations in the energy sector worldwide between 2012 and 2018. ” reads a press release published by DoJ. ’ (aka Dragonfly , Berzerk Bear, Energetic Bear, and Crouching Yeti ). ” states the DoJ.

article thumbnail

MY TAKE: Michigan’s cybersecurity readiness initiatives provide roadmap others should follow

The Last Watchdog

The first Cyber Range training and testing hub opened at Eastern Michigan University in late 2012. Other hubs followed at military bases, other state universities and even a high school and a non-profit community arts and tech center. military unit, MEDC and TARDEC this summer hosted the second annual Commercial CyberTruck Challenge.

article thumbnail

Microsoft releases On-premises Mitigation Tool (EOMT) tool to fix ProxyLogon issues

Security Affairs

The IT giant reported that at least one China linked APT group, tracked as HAFNIUM , chained these vulnerabilities to access on-premises Exchange servers to access email accounts, and install backdoors to maintain access to victim environments. Microsoft provides the following system requirements: PowerShell 3 or later IIS 7.5