Deep dive into hack against Iranian state TV yields wiper malware, other custom tools

The Jan. 27 hack of Iranian state broadcaster IRIB — which ran a message of support for opposition leaders and called for the assassination of Iran’s supreme leader — came with previously unidentified wiper malware, according to research that suggests the incident was more destructive than initially assumed. Researchers with Check Point, a Tel Aviv-based cybersecurity company, published the findings Friday based on what it said were files and other forensic evidence connected to the hack. Iranian officials acknowledged the attack at the time, saying that “disruptions” also occurred on another television channel and two radio stations, and called the hack “complex.” The breach occurred the day before Iran began its multi-day celebration of the 1979 revolution. “We could not find any evidence that these tools were used previously, or attribute them to a specific threat actor,” the researchers wrote. The files found and analyzed by Check Point include the […]

The post Deep dive into hack against Iranian state TV yields wiper malware, other custom tools appeared first on CyberScoop.

Continue reading Deep dive into hack against Iranian state TV yields wiper malware, other custom tools

Communication software startup Channels takes on event management with text workflow

Three University of Michigan students are building Channels Inc., a communication software tailored for physical workers, and already racking up some big customers in the event management industry. Continue reading Communication software startup Channels takes on event management with text workflow

2021 Data Security Trends in the US, UK, and Middle East

The pandemic fundamentally changed the way we work and at the same time opened a massive gap in cybersecurity. This was highlighted by a seemingly never-ending news cycle of high-profile breaches at organizations that were not equipped to adequat… Continue reading 2021 Data Security Trends in the US, UK, and Middle East

5 Effective Strategies for Robust Cyber Security

Cyber security strategies an organization needs to protect against prevailing cyber threats! Today large companies are taking a step forward in securing their IT infrastructure against cyber criminals by implementing new methodologies and adopting adva… Continue reading 5 Effective Strategies for Robust Cyber Security

Expanding Our Reach To Deliver World-Class API Protection to Europe and the Middle East

When the pandemic hit in early 2020, we weren’t sure what it would do to our business – would demand halt because of economic uncertainty? Would threats decrease or increase? What kind of impact would the pandemic have on application development?   Aut… Continue reading Expanding Our Reach To Deliver World-Class API Protection to Europe and the Middle East

After Gaza ceasefire, MoleRATs hacking group continues to target Middle Eastern governments

Days after Israel and Gaza-based militant group Hamas agreed to a ceasefire in May, Arabic-speaking hackers resumed an effort to break into government networks in the Middle East, according to research published Thursday. The hacking group, known as MoleRATs, sent target organizations a malware-laced PDF claiming to be a report on Hamas members meeting with the Syrian government, security firm Proofpoint said. The malicious code is able to access files and take screenshots on a victim’s computer in furtherance of a spying campaign. It’s an example of how, alongside the violence that has long marked the Israel-Palestine conflict, there are often much subtler efforts by digital spies to access networks. It’s unclear what caused the hacking group to take a two-month break starting in March, or why it resumed activity in early June. Proofpoint analysts speculated that either the Muslim holy month of Ramadan or the latest Israel-Hamas conflict, which […]

The post After Gaza ceasefire, MoleRATs hacking group continues to target Middle Eastern governments appeared first on CyberScoop.

Continue reading After Gaza ceasefire, MoleRATs hacking group continues to target Middle Eastern governments

Hackers pose as Bloomberg employees in email scam

Hackers are impersonating Bloomberg employees in an attempt to install remote access software on target computers, researchers said Wednesday. The ruse seeks to capitalize on the influence of Bloomberg Industry Group (formally known as Bloomberg BNA), whose analysis major corporations use to track markets, according to Cisco Talos, which discovered the activity. The perpetrator is sending fake Bloomberg invoices that are laced with a “remote access trojan” tools that could be used to surveil computer networks or steal data. The goal of the malicious email campaigns, and exactly who was targeted, remain unclear. But the perpetrator has clearly gone beyond the bumbling phishing emails in broken English that typically give other scammers away. It’s a clever piece of social engineering from a cyber actor that has apparently only been active for a year, but which has looked for economical ways into victim networks. One of the tools used, called NanoCore, […]

The post Hackers pose as Bloomberg employees in email scam appeared first on CyberScoop.

Continue reading Hackers pose as Bloomberg employees in email scam

Suspected Iranian hackers snooping on Middle Eastern targets anew

Hackers connected to Iran are on the loose again in the Middle East, instigating an apparent espionage campaign in five countries, Trend Micro said on Friday. The company concluded with moderate confidence that the MuddyWater hacking group, whose interests tend to align with the Iranian government’s, is behind the campaign. It’s an ongoing spearphishing effort aimed at government agencies, academia and the tourism industry in Azerbaijan, Bahrain, Israel, Saudi Arabia and the United Arab Emirates, according to Trend Micro. The research confirms research from Anomali in February, and expands the range of named targets. MuddyWater has a history of going after Middle Eastern government agencies and academia along with a range of industries, and it has a reputation for persistent spy work. What’s different about this campaign, though, is that it doesn’t exhibit the usual competence MuddyWater has demonstrated, Trend Micro said. “While it possesses remote access capabilities, the attackers […]

The post Suspected Iranian hackers snooping on Middle Eastern targets anew appeared first on CyberScoop.

Continue reading Suspected Iranian hackers snooping on Middle Eastern targets anew

Cyber Security for Small and Medium Enterprises in 2021

In today’s world, cyber security infrastructure and awareness are prerequisites for the smooth running of almost every industry. It isContinue reading
The post Cyber Security for Small and Medium Enterprises in 2021 appeared first on Kratikal Blog.
The… Continue reading Cyber Security for Small and Medium Enterprises in 2021