article thumbnail

Iran-linked group Cobalt Dickens hit over 60 universities worldwide

Security Affairs

This operation is similar to the threat group’s August 2018 campaign , using compromised university resources to send library-themed phishing emails.” The hackers appear to be interested in getting access to the library, they sent phishing messages to people with access to the library of the targeted university.

article thumbnail

Evilnum APT used Python-based RAT PyVil in recent attacks

Security Affairs

The second layer of Python code decodes and loads to memory the main RAT and the imported libraries. When comparing the malware executable with the original Oracle executable, we can see the similar metadata between the files. Copyright (C) 2014-2015 Media.net Advertising FZ-LLC All Rights Reserved -->. concludes the report.

Phishing 136
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

An Honest Look at Implementing a Digital Preservation Program and the Role of Archive-It

Archive-It

Guest post by Amber Passen (she/they), Digital Archivist for the Columbus Indiana Architectural Archives (CIAA) at the Bartholomew County Public Library in Columbus, Indiana This post is part of a series written by members of the Community Webs program. However, CIAA did not hire a full-time professional archivist until 2014.

article thumbnail

CrowdStrike uncovered a new campaign of GOBLIN PANDA APT aimed at Vietnam

Security Affairs

In 2014, experts noticed an intensification in the activity of the group that appeared interested in the dispute over the South China Sea. “Two exploit documents with Vietnamese-language file names were observed with file metadata unique to the GOBLIN PANDA adversary.” Pierluigi Paganini.

article thumbnail

Experts found binary planting and arbitrary file overwrite flaws in NPM

Security Affairs

NPM , the biggest package manager for JavaScript libraries, has addressed a vulnerability that could be exploited to execute “binary planting” attacks. json , a file that npm uses to contain the metadata about the project and its dependencies. Copyright (C) 2014-2015 Media.net Advertising FZ-LLC All Rights Reserved -->.

article thumbnail

Meet Your 2018-2019 Records Management Section Steering Committee

The Schedule

Eira has worked as the Digital Archivist/Records Manager at the University of Cincinnati’s Archives and Rare Books Library since 2013. She was previously elected to the 2014-2015 SAA Nominating Committee, and was recently appointed to SAA’s Committee on Public Policy for a three-year term. Holly Dolan , Steering Committee Member.

article thumbnail

Attor malware was developed by one of the most sophisticated espionage groups

Security Affairs

The malware implements a modular structure with a dispatcher and loadable plugins, all of which are implemented as dynamic-link libraries (DLLs). It is responsible for collection of metadata, not the files themselves, so we consider it a plugin used for device fingerprinting, and hence likely used as a base for further data theft.”