Remove 12
Remove 2014 Remove Analysis Remove Data Remove Government Remove Security
article thumbnail

USCYBERCOM shares five new North Korea-linked malware samples

Security Affairs

. “On May 12, 2020, the Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), and the Department of Defense (DoD) released three Malware Analysis Reports (MARs) on malware variants used by the North Korean government.” Department of Homeland Security, the U.S.

Analytics 116
article thumbnail

New FinFisher spyware used to spy on iOS and Android users in 20 countries

Security Affairs

According to the experts, the new versions have been active at least since 2018, one of the samples analyzed by Kaspersky was used last month in Myanmar, where local government is accused of violating human rights. Experts pointed out that the new FinFisher implant for iOS doesn’t support the latest iOS 12.x. Pierluigi Paganini.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Lampion malware origin servers geolocated in Turkey

Security Affairs

From December 2019 it had spread, impersonating and using template emails from the Portuguese Government Finance & Tax (Portal das Finanças – ATA) , Energias de Portugal (EDP) , and most recently DPD firm – an international parcel delivery service. Copyright (C) 2014-2015 Media.net Advertising FZ-LLC All Rights Reserved -->.

article thumbnail

Trojan Lampion is back after 3 months

Security Affairs

Trojan Lampion is a malware observed at the end of the year 2019 impacting Portuguese users using template emails from the Portuguese Government Finance & Tax and EDP. Figure 4: Malicious MSI file downloaded from AWS S3 bucket and using COVID-19 theme that impersonates the Portuguese Government. com/team-modulosp/P-12-9.]dll–

Cloud 106
article thumbnail

Is Emotet gang targeting companies with external SOC?

Security Affairs

Today I’d like to share a quick analysis resulted by a very interesting email which claimed to deliver a SOC “weekly report” on the victim email. SOC report 10 12 2019.doc Technical Analysis. Analysis of dropped and executed file (emotet). But let’s try to quickly check it. Emotet Depacked. Conclusion.

article thumbnail

Fractured Block Campaign: CARROTBAT dropper dupports a dozen decoy document formats

Security Affairs

Security experts from Palo Alto Networks have discovered a malware dropper, dubbed CARROTBAT, that could support a dozen decoy document file formats to drop many payloads. ” reads the analysis published by Palo Alto Networks. ” ~ Copyright (C) 2014-2015 Media.net Advertising FZ-LLC All Rights Reserved -->.

article thumbnail

GUEST ESSAY: The story behind how DataTribe is helping to seed ‘Cybersecurity Valley’ in Maryland

The Last Watchdog

Within these government labs and agencies, taking place is a groundswell of innovation in deep technology cyber disciplines to the tune of billions of dollars annually over the past three decades. The state counts approximately 109,000 cyber engineers. Two notable examples are Sourcefire, acquired by Cisco for $2.7B