Remove 10
Remove 2014 Remove Analysis Remove Retail Remove Tools
article thumbnail

TA505 is expanding its operations

Security Affairs

The threat group is also known for its recent attack campaign against Bank and Retail business sectors, but the latest evidence indicates a potential expansion of its criminal operation to other industries too. Technical Analysis. The tool is able to grant remote access and full, direct control of the infected machine to the group.

IT 66
article thumbnail

The stealthy email stealer in the TA505 hacker group’s arsenal

Security Affairs

In fact, many independent researchers pointed to a particular email attack wave probably related to the known TA505 hacking group , active since 2014 and focusing on Retail and Banking companies. Technical Analysis. The piece of malware under analysis were downloaded from “bullettruth[.com/out[.exe”,

Retail 71
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

TA505 Cybercrime targets system integrator companies

Security Affairs

The analysis of a malicious email revealed a possible raising interest of the TA505 cybercrime gang in system integrator companies. During a normal monitoring activity, one of the detection tools hits a suspicious email coming from the validtree.com domain. Technical Analysis. Introduction.

article thumbnail

ATMitch: New Evidence Spotted In The Wild

Security Affairs

Its initial triage suggests it may be part of an advanced attacker arsenal targeting the Banking sector, possibly related to the same APT group Kaspersky Lab tracked two years ago after the compromise of a Russian bank, where a particular malware tool dubbed ATMi tch has been unveiled. Technical Analysis. exe” process by malware.

article thumbnail

Cyber-Criminal espionage Operation insists on Italian Manufacturing

Security Affairs

This actor was first spotted by PaloAlto’s UNIT42 in 2018 during wide scale operations against technology, retail, manufacturing, and local government industries in the US, Europe and Asia. All threats use at least one obfuscation method to make the analysis harder. Technical Analysis. Figure 10: Amsi Bypass exploit evidence.

article thumbnail

Security Ledger Podcast: Security Automation Is (And Isn't) The Future Of InfoSec

ForAllSecure

Machine learning algorithms are already being used in transportation to ease road congestion, in healthcare to spot medical errors and improve patient care and in retail to improve the customer shopping experience. ForAllSecure does automated analysis to find unknown defects in applications. When it comes to what can you do today?

article thumbnail

Security Ledger Podcast: Security Automation Is (And Isn't) The Future Of InfoSec

ForAllSecure

Machine learning algorithms are already being used in transportation to ease road congestion, in healthcare to spot medical errors and improve patient care and in retail to improve the customer shopping experience. ForAllSecure does automated analysis to find unknown defects in applications. When it comes to what can you do today?