article thumbnail

SHARED INTEL: How ransomware evolved from consumer trickery to deep enterprise hacks

The Last Watchdog

The epidemic went truly mainstream with the release of CryptoLocker back in 2013, and it has since transformed into a major dark web economy spawning the likes of Sodinokibi, Ryuk, and Maze lineages that are targeting the enterprise on a huge scale in 2020. FBI spoofs 2012 – 2013. File encryption 2013 – 2015.

article thumbnail

New KilllSomeOne APT group leverages DLL side-loading

Security Affairs

The technique was already employed by other Chinese APT groups since 2013, later it was also adopted by other cybercrime gangs in attacks in the wild. ” reads the analysis published by Sophos. The attackers use a simple XOR encryption algorithm with the string “Hapenexx is very bad” as a key.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Attor malware was developed by one of the most sophisticated espionage groups

Security Affairs

Threat actors have been using Attor since 2013, the malicious code remained under the radar until last year. “ Attor’s espionage operation is highly targeted – we were able to trace Attor’s operation back to at least 2013, yet, we only identified a few dozen victims.” ” reads the analysis published by ESET.

article thumbnail

North Korea-linked malware ATMDtrack infected ATMs in India

Security Affairs

Further analysis showed that the malware was designed to be planted on the victim’s ATMs, where it could read and store the data of cards that were inserted into the machines.” ” reads the analysis published by Kaspersky. ” states the analysis. ” concludes Kaspersky.

article thumbnail

Security Compliance & Data Privacy Regulations

eSecurity Planet

M]uch of InfoSec management falls back on employee training and avoiding employee error – particularly with respect to phishing , spear phishing, and encryption lapses.”. A] lot of companies [still] do the compliance auditing and analysis piece manually,” said Luria. See the Best Cybersecurity Awareness Training for Employees.

article thumbnail

PhantomLance, a four-year-long cyberespionage spying campaign

Security Affairs

” reads the analysis published by Kaspersky. Kaspersky experts found a similar sample on Google Play, it implements high levels of encryption, furthermore, the malicious code was able to download and execute additional malicious payloads that would be suitable to the specific device environment (i.e

Marketing 102
article thumbnail

OceanLotus APT group leverages a steganography-based loader to deliver backdoors

Security Affairs

The APT32 group, also known as OceanLotus Group, has been active since at least 2013, according to the experts it is a state-sponsored hacking group. “ Threat actors used a custom steganography algorithm to hide the encrypted payload within PNG images to to avoid detection. ” reads the report published by the experts.