article thumbnail

US Gov warns of BEC attacks to hijack shipments of food products

Security Affairs

US government is warning of business email compromise (BEC) attacks aimed at hijacking shipments of food products and ingredients. In BEC attacks threat actors usually aims at compromising email communications to hijack payments, this time the attacks target the food and agriculture sector with a different purpose.

article thumbnail

New Bad Magic APT used CommonMagic framework in the area of Russo-Ukrainian conflict

Security Affairs

In October 2022, Kaspersky researchers uncovered a malware campaign aimed at infecting government, agriculture and transportation organizations located in the Donetsk, Lugansk, and Crimea regions with a previously undetected framework dubbed CommonMagic. “When started, the backdoor creates a mutex – WinEventCom.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Operation Blacksmith: Lazarus exploits Log4j flaws to deploy DLang malware

Security Affairs

Two of these malware strains are remote access trojans (RATs), respectively tracked as NineRAT and “DLRAT” The former relies on Telegram bots and channels for C2 communications. In March, the threat actors hit a South American agricultural organization.

article thumbnail

A deeper insight into the CloudWizard APT’s activity revealed a long-running activity

Security Affairs

In October 2022, Kaspersky researchers uncovered a malware campaign aimed at infecting government, agriculture and transportation organizations located in the Donetsk, Lugansk, and Crimea regions with a previously undetected framework dubbed CommonMagic. When started, the backdoor creates a mutex – WinEventCom.

article thumbnail

Iranian hackers access unsecured HMI at Israeli Water Facility

Security Affairs

Experts noticed that the system still allows communications on port 502, which is used for Modbus protocol, that doesn’t require any authentication/encryption. One of the attacks hit agricultural water pumps in upper Galilee, while the other one hit water pumps in the central province of Mateh Yehuda. Pierluigi Paganini.

Access 114
article thumbnail

Hunting the ICEFOG APT group after years of silence

Security Affairs

The cyber mercenaries were recruited by governments and private companies, it was composed of highly skilled hackers able to conduct sophisticated attacks. ICEFOG-M is the latest variant, it is a fileless malware that supports the same features of the ICEFOG-P but leverages HTTPs for communications.

article thumbnail

The Week in Cyber Security and Data Privacy: 12 – 18 February 2024

IT Governance

Source 1 ; source 2 New Healthcare USA Yes 12,539 Cal-Comp Electronics Source New Manufacturing Thailand Yes 12,000 Tax Favored Benefits Source New Finance USA Yes 10,974 US GAO (Government Accountability Office) Source New Public USA Yes 6,600 Dobson Technologies, Inc.