Remove 10
Remove 2014 Remove Analysis Remove Military Remove Passwords
article thumbnail

XDSpy APT remained undetected since at least 2011

Security Affairs

The APT group, recently discovered by ESET, targeted government and private companies in Belarus, Moldova, Russia, Serbia, and Ukraine, including militaries and Ministries of Foreign Affairs. “It is very uncommon to find a cyber espionage operation without any public reporting after almost 10 years of activity.”

Military 135
article thumbnail

Cyberwarfare: A deep dive into the latest Gamaredon Espionage Campaign

Security Affairs

Security experts from Yoroy-Cybaze ZLab have conducted a detailed analysis of an implant used by the Gamaredon APT group in a recent campaign. Gamaredon has been active since 2014, and during this time, the modus operandi has remained almost the same. Technical Analysis. Introduction. Cleaning the script we obtain: Figure 9.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

MartyMcFly Malware: new Cyber-Espionage Campaign targeting Italian Naval Industry

Security Affairs

Today I’d like to share an interesting analysis of a Targeted Attack found and dissected by Yoroi (technical details are available here ). The victim was one of the most important leaders in the field of security and defensive military grade Naval ecosystem in Italy. For IoC please visit the analysis from here.

article thumbnail

SWEED targets precision engineering companies in Italy

Security Affairs

Security expert Marco Ramilli published a quick analysis of an interesting attack carried out by SWEED threat actor targeting precision engineering firms in Italy. Today I’d like to share a quick analysis of an interesting attack targeting precision engineering companies based in Italy. Technical Analysis. Introduction.

article thumbnail

A month later Gamaredon is still active in Eastern Europe

Security Affairs

During recent times, Gamaredon is targeting the Ukrainian military and law enforcement sectors too, as officially stated by the CERT-UA. Technical Analysis. The infection chain is composed by different stages of password protected SFX (self extracting archive), each containing vbs or batch scripts. Malicious e-mail.

article thumbnail

An Approach to Cybersecurity Risk Oversight for Corporate Directors

Data Matters

Commonly used in military contexts, mandatory policies imply that all access control policy decisions are made by a centralized authority, such that individual users cannot change access rights. The 2018 guidance supplements the SEC’s October 13, 2011, CF Disclosure Guidance: Topic No. Mandatory Access Control. Role-Based Access Control.