Lazarus impersonated Meta recruiter to breach Spanish aerospace firm

Operators of the North Korea-linked Lazarus APT obtained initial access to the network of an aerospace company in Spain last year after a successful spearphishing campaign, by masquerading as a recruiter for Meta — the company behind Facebook, Instagra… Continue reading Lazarus impersonated Meta recruiter to breach Spanish aerospace firm

Hidden dangers loom for subsea cables, the invisible infrastructure of the internet

More than 97% of the world’s internet traffic passes through subsea cables at some point, according to ENISA. Subsea cables are a vital component of the global internet infrastructure, and it is critical to protect them from cyberattacks, physical atta… Continue reading Hidden dangers loom for subsea cables, the invisible infrastructure of the internet

Microsoft: Iranian espionage campaign targeted satellite and defense sectors

Tehran’s latest hacking activity involves easy-to-detect techniques to gain access and then pivoting to stealthier methods.

The post Microsoft: Iranian espionage campaign targeted satellite and defense sectors appeared first on CyberScoop.

Continue reading Microsoft: Iranian espionage campaign targeted satellite and defense sectors

How Chinese hackers got their hands on Microsoft’s token signing key

The mystery of how Chinese hackers managed to steal a crucial signing key that allowed them to breach Microsoft 365’s email service and access accounts of employees of 25 government agencies has been explained: they found it somewhere where it shouldn&… Continue reading How Chinese hackers got their hands on Microsoft’s token signing key

Trojanized Signal, Telegram apps found on Google Play, Samsung Galaxy Store

ESET researchers have identified two active campaigns targeting Android users, where the threat actors behind the tools for Telegram and Signal are attributed to the China-aligned APT group GREF. Most likely active since July 2020 and since July 2022, … Continue reading Trojanized Signal, Telegram apps found on Google Play, Samsung Galaxy Store

Microsoft: Chinese APT Flax Typhoon uses legit tools for cyber espionage

By Deeba Ahmed
Researchers believe that this time instead of cyber espionage, Chinese threat actors may have opted for more complex information ops.
This is a post from HackRead.com Read the original post: Microsoft: Chinese APT Flax Typhoon uses legit… Continue reading Microsoft: Chinese APT Flax Typhoon uses legit tools for cyber espionage

Hackers with links to Pro-Russian groups compromised foreign embassies in Belarus, researchers say

The work has been carried out by a newly identified group dubbed “MustachedBouncer,” according to researchers with ESET.

The post Hackers with links to Pro-Russian groups compromised foreign embassies in Belarus, researchers say appeared first on CyberScoop.

Continue reading Hackers with links to Pro-Russian groups compromised foreign embassies in Belarus, researchers say

North Korean hackers breached Russian missile development firm

North Korean state-sponsored hackers have breached Russian missile maker NPO Mashinostroyeniya, according to SentinelLabs researchers. North Korean hackers discovered The researchers came across leaked email communication between NPO Mashinostroyeniya&… Continue reading North Korean hackers breached Russian missile development firm

Microsoft Exchange servers compromised by Turla APT

Turla has been targeting defense sector organizations in Ukraine and Eastern Europe with DeliveryCheck and Kazuar backdoors / infostealers and has been using compromised Microsoft Exchange servers to control them. Turla APT Turla (aka Secret Blizzard, … Continue reading Microsoft Exchange servers compromised by Turla APT

Chinese hackers forged authentication tokens to breach government emails

Sophisticated hackers have accessed email accounts of organizations and government agencies via authentication tokens they forged by using an acquired Microsoft account (MSA) consumer signing key, the company has revealed on Tuesday. “The threat … Continue reading Chinese hackers forged authentication tokens to breach government emails