Malware linked to Salt Typhoon used to hack telcos around the world

A report from Trend Micro details the highly sophisticated ways Salt Typhoon carries out its operations.

The post Malware linked to Salt Typhoon used to hack telcos around the world appeared first on CyberScoop.

Continue reading Malware linked to Salt Typhoon used to hack telcos around the world

What keeps CISOs up at night? Mandiant leaders share top cyber concerns

A trio of top brass for Mandiant shared the emerging advanced tactics, techniques and procedures that they see troubling cyber professionals.

The post What keeps CISOs up at night? Mandiant leaders share top cyber concerns appeared first on CyberScoop.

Continue reading What keeps CISOs up at night? Mandiant leaders share top cyber concerns

Congratulations, You’ve Won a Meterpreter Shell

Posted by Josh Stroschein, Ratnesh Pandey and Alex Holland. For an attack to succeed undetected, attackers need to limit the creation of file and network artifacts by their malware. In this post, we analyse an attack that illustrates two popular tactic… Continue reading Congratulations, You’ve Won a Meterpreter Shell

Separ Infostealer Using “Living off the Land” Tactics to Target Businesses

The Separ infostealer is using what’s known as “Living off the Land” tactics to target businesses as part of an ongoing attack campaign. Digital security company Deep Instinct detected the campaign and observed that an infection begin… Continue reading Separ Infostealer Using “Living off the Land” Tactics to Target Businesses

Cybercriminals ‘hide in plain sight’ to shake down West African financial players

Cybercriminals are using a combination of hacking techniques to target financial institutions throughout West Africa, according to research published Thursday by Symantec. Firms in Cameroon, Congo, Ghana, Equatorial Guinea and Ivory Coast have been hit with cyberattacks that combine known forms of malicious software with “living off the land” techniques to infiltrate organizations. “Living off the land” is industry jargon that refers to hackers’ exploitation of otherwise benign tools already installed on a computer. In this case, attackers used PowerShell scripts, remote desktop protocols and Microsoft administration tools in gaining access to their targets, researchers found. Symantec identified four types of such cyberattacks but did not attribute them to any specific hacking group. Instead it described the research as an example the globalization of cybercrime. “Until now, Symantec has seen relatively little evidence of these kinds of attacks against the financial sector,” the company said in a blog post. “However, it now appears […]

The post Cybercriminals ‘hide in plain sight’ to shake down West African financial players appeared first on CyberScoop.

Continue reading Cybercriminals ‘hide in plain sight’ to shake down West African financial players

A Container Hacker’s Guide to Living Off of the Land

Sometimes as a pentester you find yourself in tricky situations. Depending on the type of engagement, you might want to try to avoid making a lot of noise on the network if possible. This blog post is going to talk about two techniques to use to gather… Continue reading A Container Hacker’s Guide to Living Off of the Land