Remove 2017 Remove Libraries Remove Military Remove Security
article thumbnail

Targeted operation against Ukraine exploited 7-year-old MS Office bug

Security Affairs

Security experts at Deep Instinct Threat Lab have uncovered a targeted campaign against Ukraine, exploiting a Microsoft Office vulnerability dating back almost seven years to deploy Cobalt Strike on compromised systems. The DLL also implements features to evade detection and avoid analysis by security experts. space and petapixel[.]fun

Military 118
article thumbnail

InvisiMole group targets military sector and diplomatic missions in Eastern Europe

Security Affairs

Security researchers at ESET recently uncovered a campaign carried out by the InvisiMole group that has been targeting a small number of high-profile organizations in the military sector and diplomatic missions in Eastern Europe. The attack chain begins with the deployment of a TCP downloader that fetches the next stage payload.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

New Gallmaker APT group eschews malware in cyber espionage campaigns

Security Affairs

A previously unknown cyber espionage group, tracked as Gallmaker, has been targeting entities in the government, military and defense sectors since at least 2017. Gallmaker is a politically motivated APT group that focused its surgical operations on the government, military or defense sectors. ” continues Symantec.

article thumbnail

MY TAKE: How advanced automation of threat intel sharing has quickened incident response

The Last Watchdog

based security vendor in the thick of helping companies make more of their threat feeds. The company launched in 2013, the brainchild of Ryan Trost and Wayne Chiang, a couple of buddies working as security analysts in a U.S. We spoke at Black Hat USA 2019. ThreatQuotient is a Reston, Virg.-based

Big data 153
article thumbnail

Breaking the Ice on DICE: scaling secure Internet of Things Identities

The Security Ledger

In this Spotlight Podcast, sponsored by Trusted Computing Group*, Dennis Mattoon of Microsoft Research gives us the low-down on DICE: the Device Identifier Composition Engine Architectures, which provides a means of solving a range of security and identity problems on low cost, low power IoT endpoints. Among them: establishing strong device.

IoT 40
article thumbnail

Latest Turla backdoor leverages email PDF attachments as C&C mechanism

Security Affairs

The new analysis conducted by ESET revealed that hackers breached Germany’s Federal Foreign Office , Turla infected several computers and used the backdoor to syphon data for almost the whole of 2017. The backdoor is a standalone DLL (dynamic link library) that interacts with Outlook and The Bat! Pierluigi Paganini.

article thumbnail

Chinese Cycldek APT targets Vietnamese Military and Government in sophisticated attacks

Security Affairs

China-linked APT group Cycldek is behind an advanced cyberespionage campaign targeting entities in the government and military sector in Vietnam. China-linked APT group LuckyMouse (aka Cycldek, Goblin Panda , Hellsing, APT 27, and Conimes) is targeting government and military organizations in Vietnam with spear-phishing.