Remove Agriculture Remove Communications Remove Government Remove Groups
article thumbnail

Operation Blacksmith: Lazarus exploits Log4j flaws to deploy DLang malware

Security Affairs

North Korea-linked APT group Lazarus was spotted exploiting Log4j vulnerabilities to deploy previously undocumented remote access trojans. The North Korea-linked APT group Lazarus is behind a new hacking campaign that exploits Log4j vulnerabilities to deploy previously undocumented remote access trojans (RATs).

article thumbnail

Hunting the ICEFOG APT group after years of silence

Security Affairs

A security researcher found new evidence of activities conducted by the ICEFOG APT group, also tracked by the experts as Fucobha. Chi-en (Ashley) Shen, a senior security researcher at FireEye, collected evidence that demonstrates that China-linked APT group ICEFOG (aka Fucobha ) is still active.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

New Bad Magic APT used CommonMagic framework in the area of Russo-Ukrainian conflict

Security Affairs

In October 2022, Kaspersky researchers uncovered a malware campaign aimed at infecting government, agriculture and transportation organizations located in the Donetsk, Lugansk, and Crimea regions with a previously undetected framework dubbed CommonMagic. pdf.lnk) used to start the infection and deploy the PowerMagic backdoor.

article thumbnail

A deeper insight into the CloudWizard APT’s activity revealed a long-running activity

Security Affairs

On March 2023, researchers from Kaspersky spotted a previously unknown APT group, tracked as Bad Magic (aka Red Stinger), that targeted organizations in the region of the Russo-Ukrainian conflict. The APT group targeted individuals, as well as diplomatic and research organizations in the area of the conflict.

article thumbnail

Iranian hackers access unsecured HMI at Israeli Water Facility

Security Affairs

A group of Iranian hackers gained access to a un unprotected ICS at an Israeli Water Facility and posted a video as proof of the hack. Researchers from industrial cybersecurity firm OTORIO revealed that a group of Iranian hackers gained access to a un unprotected ICS at the Israeli Water Facility. ” concludes the post.

Access 107
article thumbnail

The Week in Cyber Security and Data Privacy: 5 – 11 February 2024

IT Governance

GB Western Municipal Construction Source New Construction and real estate USA Yes 101 GB Tennessee Farmers Insurance Source New Insurance USA Yes 71,000 CNO ACE Source 1 ; source 2 New Healthcare USA Yes 65,195 Verizon Communications Inc. TB KSA Architecture Source New Construction and real estate USA Yes 1.5 GB Signature Performance, Inc.

article thumbnail

The Week in Cyber Security and Data Privacy: 12 – 18 February 2024

IT Governance

Source 1 ; source 2 New Healthcare USA Yes 12,539 Cal-Comp Electronics Source New Manufacturing Thailand Yes 12,000 Tax Favored Benefits Source New Finance USA Yes 10,974 US GAO (Government Accountability Office) Source New Public USA Yes 6,600 Dobson Technologies, Inc.