article thumbnail

A member of the FIN7 group was sentenced to 10 years in prison

Security Affairs

Fedir Hladyr (35), a Ukrainian national was sentenced today to 10 years in prison for his role in the financially motivated group FIN7, aka Carbanak. Between 2014 and 2016 the group used a new custom malware dubbed Carbanak that is considered a newer version of Anunak. The man is suspected to be a supervisor of the group.

article thumbnail

Kimsuky APT poses as journalists and broadcast writers in its attacks

Security Affairs

North Korea-linked APT group Kimsuky is posing as journalists to gather intelligence, a joint advisory from NSA and FBI warns. Kimsuky cyberespionage group (aka ARCHIPELAGO, Black Banshee, Thallium , Velvet Chollima, APT43 ) was first spotted by Kaspersky researcher in 2013. A joint advisory from the FBI, the U.S.

IT 93
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

City of Dallas has set a budget of $8.5 million to mitigate the May Royal ransomware attack

Security Affairs

CBS News Texas obtained an image the ransomware note dropped by the malware on the infected systems. MILES/CBS NEWS TEXAS The Royal ransomware group is behind the attack and threatens to publish stolen data if the City will not meet its ransom demand. ” continues the report.

article thumbnail

Microsoft warns of Human-Operated Ransomware as a growing threat to businesses

Security Affairs

“They exhibit extensive knowledge of systems administration and common network security misconfigurations, perform thorough reconnaissance, and adapt to what they discover in a compromised network.” The first group, tracked as PARINACOTA, has been monitored by Microsoft for 18 months. ” continues the report.

article thumbnail

Red Team vs Blue Team vs Purple Team: Differences Explained

eSecurity Planet

Blue teams consist of security analysts, network engineers and system administrators. The red team is a smaller group compared to the blue team and it may include a few members such as ethical hackers, locksmiths, programmers, and social engineers. Purple Teams The purple team will typically be implemented in one of two ways.

article thumbnail

Five Eyes Intelligence agencies warn of popular hacking tools

Security Affairs

To aid the work of network defenders and systems administrators, we also provide advice on limiting the effectiveness of these tools and detecting their use on a network.” The China Chopper is a tiny shell (4K) widely used in attacks in the wild since 2012, early this year the China-linked APT group Leviathan.

article thumbnail

Stealth Falcon’s undocumented backdoor uses Windows BITS to exfiltrate data

Security Affairs

ESET researchers discovered a new malware associated with the Stealth Falcon APT group that abuses the Windows BITS service to stealthy exfiltrate data. Security researchers from discovered a new malware associated with the Stealth Falcon cyber espionage group that abuses the Windows BITS service to stealthy exfiltrate data.