IT threat evolution in Q2 2023

Q2 2023 overview: targeted attacks such as Operation Triangulation, CloudWizard and Lazarus activity, Nokoyawa ransomware, and others. Continue reading IT threat evolution in Q2 2023

North Korean APT Hacks Internet Infrastructure Provider via ManageEngine Flaw

North Korea-linked Lazarus Group exploited a ManageEngine vulnerability to compromise an internet backbone infrastructure provider.
The post North Korean APT Hacks Internet Infrastructure Provider via ManageEngine Flaw appeared first on SecurityWeek.
Continue reading North Korean APT Hacks Internet Infrastructure Provider via ManageEngine Flaw

North Korea ready to cash out more than $40 million in Bitcoin after summer of hacks, warns FBI

After a series of high-profile cryptocurrency hacks, the state-sponsored North Korean Lazarus Group is poised to cash out millions of dollars.

Read more in my article on the Tripwire State of Security blog. Continue reading North Korea ready to cash out more than $40 million in Bitcoin after summer of hacks, warns FBI

Elite North Korean Hackers Breach Russian Missile Developer

By Waqas
North Korean hackers from OpenCarrot and Lazarus breached NPO Mashinostroyeniya, a major Russian missile developer, for at least five months last year.
This is a post from HackRead.com Read the original post: Elite North Korean Hackers Breach … Continue reading Elite North Korean Hackers Breach Russian Missile Developer

N. Korean Lazarus Group Suspected in $37.3M CoinsPaid Crypto Heist

By Habiba Rashid
CoinsPaid’s internal systems were compromised, prompting the firm to temporarily halt operations for four days.
This is a post from HackRead.com Read the original post: N. Korean Lazarus Group Suspected in $37.3M CoinsPaid Crypto Heist
Continue reading N. Korean Lazarus Group Suspected in $37.3M CoinsPaid Crypto Heist

APT trends report Q1 2023

For more than five years, the Global Research and Analysis Team (GReAT) at Kaspersky has been publishing quarterly summaries of advanced persistent threat (APT) activity. These summaries are based on our threat intelligence research; and they provide a representative snapshot of what we have published and discussed in greater detail in our private APT reports. Continue reading APT trends report Q1 2023

APT trends report Q1 2023

For more than five years, the Global Research and Analysis Team (GReAT) at Kaspersky has been publishing quarterly summaries of advanced persistent threat (APT) activity. These summaries are based on our threat intelligence research; and they provide a representative snapshot of what we have published and discussed in greater detail in our private APT reports. Continue reading APT trends report Q1 2023

Not just an infostealer: Gopuram backdoor deployed through 3CX supply chain attack

A DLL named guard64.dll, which was loaded into the infected 3CXDesktopApp.exe process, was used in recent deployments of a backdoor that we dubbed “Gopuram” and had been tracking internally since 2020. Continue reading Not just an infostealer: Gopuram backdoor deployed through 3CX supply chain attack