article thumbnail

OceanLotus APT group leverages a steganography-based loader to deliver backdoors

Security Affairs

The APT32 group, also known as OceanLotus Group, has been active since at least 2013, according to the experts it is a state-sponsored hacking group. “ Threat actors used a custom steganography algorithm to hide the encrypted payload within PNG images to to avoid detection. ” reads the report published by the experts.

article thumbnail

New KilllSomeOne APT group leverages DLL side-loading

Security Affairs

Dynamic-link library (DLL) side-loading takes advantage of how Microsoft Windows applications handle DLL files. The technique was already employed by other Chinese APT groups since 2013, later it was also adopted by other cybercrime gangs in attacks in the wild. “This is an effort to conceal the execution.”

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Attor malware was developed by one of the most sophisticated espionage groups

Security Affairs

Threat actors have been using Attor since 2013, the malicious code remained under the radar until last year. “ Attor’s espionage operation is highly targeted – we were able to trace Attor’s operation back to at least 2013, yet, we only identified a few dozen victims.” ” reads the analysis published by ESET.

article thumbnail

Iran-linked group Cobalt Dickens hit over 60 universities worldwide

Security Affairs

This operation is similar to the threat group’s August 2018 campaign , using compromised university resources to send library-themed phishing emails.” The hackers appear to be interested in getting access to the library, they sent phishing messages to people with access to the library of the targeted university.

article thumbnail

Chinese Cycldek APT targets Vietnamese Military and Government in sophisticated attacks

Security Affairs

at least since 2013. The Cycldek group was first spotted in September 2013, in past campaigns it mainly targeted entities in Southeast Asia using different malware variants, such as PlugX and HttpTunnel. “Communications with the server can take place either over raw TCP sockets encrypted with RC4, or via HTTPS.

article thumbnail

InvisiMole group targets military sector and diplomatic missions in Eastern Europe

Security Affairs

The group has been active since at least 2013, ESET experts linked the group to the Gamaredon Russian APT group Gamaredon despite considers the two crews independent. It exploits a vulnerability in the Windows wdigest.dll library and then uses an improved ListPlanting technique to inject its code into a trusted process.

article thumbnail

How to Prevent SQL Injection Attacks

eSecurity Planet

For SQLi purposes, this means keeping all web application software components, including database server software, frameworks, libraries, plug-ins, and web server software, up to date. . Encryption: Keep Your Secrets Secret. Encryption is almost universally employed as a data protection technique today and for a good reason.

Passwords 117