Remove 12
Remove 2019 Remove Analysis Remove Military Remove Passwords
article thumbnail

U.S. Charges 4 Chinese Military Officers in 2017 Equifax Hack

Krebs on Security

as members of the PLA’s 54 th Research Institute, a component of the Chinese military. Attorney General Bill Barr said at a press conference today that the Justice Department doesn’t normally charge members of another country’s military with crimes (this is only the second time the agency has indicted Chinese military hackers).

Military 253
article thumbnail

Transparent Tribe APT hit 1000+ victims in 27 countries in the last 12 months

Security Affairs

The Transparent Tribe cyber-espionage group continues to improve its arsenal while targets Military and Government entities. The Transparent Tribe APT group is carrying out an ongoing cyberespionage campaign aimed at military and diplomatic targets worldwide. ” reads the analysis published by Kaspersky.

Military 122
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cyberwarfare: A deep dive into the latest Gamaredon Espionage Campaign

Security Affairs

Security experts from Yoroy-Cybaze ZLab have conducted a detailed analysis of an implant used by the Gamaredon APT group in a recent campaign. It is distributed in a spear-phishing campaign with a weaponized office document that appears to be designed to lure military personnel. . Technical Analysis. Introduction.

article thumbnail

Ransomware Protection in 2021

eSecurity Planet

Ransomware frequently contains extraction capabilities that can steal critical information like usernames and passwords, so stopping ransomware is serious business. Forensic Analysis. In 2019, Danish company Demant paid $85 million after losing access to 22,000 computers in 40 countries. Utilize a CASB. Rapid Response Testing.

article thumbnail

A month later Gamaredon is still active in Eastern Europe

Security Affairs

During recent times, Gamaredon is targeting the Ukrainian military and law enforcement sectors too, as officially stated by the CERT-UA. Technical Analysis. The infection chain is composed by different stages of password protected SFX (self extracting archive), each containing vbs or batch scripts. Malicious e-mail.