Lazarus group conducting malware attacks to steal Bitcoins

By Waqas
Bitcoin’s price set a new record on Saturday when it reached
This is a post from HackRead.com Read the original post: Lazarus group conducting malware attacks to steal Bitcoins
Continue reading Lazarus group conducting malware attacks to steal Bitcoins

US Government issues alert about North Korean “Hidden Cobra” cyber attacks

The FBI and US Department of Homeland Security have issued an alert that hackers have targeted the aerospace industry, financial services and critical infrastructure with a remote access trojan (RAT) to further exploit vulnerable networks.
Read more in… Continue reading US Government issues alert about North Korean “Hidden Cobra” cyber attacks

APT Trends report Q2 2017

Since 2014, Kaspersky Lab’s Global Research and Analysis Team (GReAT) has been providing threat intelligence reports to a wide-range of customers worldwide, leading to the delivery of a full and dedicated private reporting service. Prior to the new service offering, GReAT published research online for the general public in an effort to help combat the ever-increasing threat from nation-state and other advanced actors. Continue reading APT Trends report Q2 2017

DHS identifies North Korean hacking infrastructure used by Lazarus Group

Anticipating that North Korea will continue to use the Lazarus Group to advance the dictatorship’s military and strategic objectives, U.S. authorities issued a report Tuesday identifying new details on the tools and infrastructure used by North Korea’s digital army. The technical alert, produced by the Department of Homeland Security’s Computer Emergency and Response Team and the Federal Bureau of Investigation, identified with “high confidence” IP addresses and malware called DeltaCharlie that the hacking group allegedly uses to manage its botnet infrastructure. The report includes numerous indicators of compromise meant to aid defenders targeted by the group. Lazarus, which the new report refers to as HIDDEN COBRA, has been implicated in a series of multibillion-dollar bank thefts across 18 countries as well as attacks against “media, aerospace, financial, and critical infrastructure sectors in the United States and globally.” “Tools and capabilities used by HIDDEN COBRA actors include DDoS botnets, keyloggers, remote access tools […]

The post DHS identifies North Korean hacking infrastructure used by Lazarus Group appeared first on Cyberscoop.

Continue reading DHS identifies North Korean hacking infrastructure used by Lazarus Group

WannaCry Ransom Note Written by Chinese, English Speaking Authors

A linguistics analysis of the 28 ransom notes included with WannaCry indicate that native Chinese and English speakers wrote the original note, Flashpoint said. Continue reading WannaCry Ransom Note Written by Chinese, English Speaking Authors

WannaCry and Lazarus Group – the missing link?

Moments ago, Neel Mehta, a researcher at Google posted a mysterious message on Twitter. The cryptic message in fact refers to similarity between samples that have shared code between themselves. The two samples Neel refers to post are a Wannacry cryptor sample and a Lazarus APT group sample. Continue reading WannaCry and Lazarus Group – the missing link?

APT Trends report, Q1 2017

Kaspersky Lab is currently tracking more than a hundred threat actors and sophisticated malicious operations in over 80 countries. During the first quarter of 2017, there were 33 private reports released to subscribers of our Intelligence Services, with IOC data and YARA rules to assist in forensics and malware-hunting. Continue reading APT Trends report, Q1 2017

Security Analyst Summit 2017 Day One Recap

Mike Mimoso and Chris Brook recap the first day of this year’s Security Analyst Summit, including Mark Dowd’s memory corruption bug keynote, the digital archeology around Moonlight Maze, ATM hacking, and the Lazarus APT. Continue reading Security Analyst Summit 2017 Day One Recap