China Admitted to US That It Conducted Volt Typhoon Attacks: Report

In a secret meeting between Chinese and US officials, the former confirmed conducting cyberattacks on US infrastructure.
The post China Admitted to US That It Conducted Volt Typhoon Attacks: Report appeared first on SecurityWeek.
Continue reading China Admitted to US That It Conducted Volt Typhoon Attacks: Report

North Korea’s IT Operatives Are Exploiting Remote Work Globally

The global rise of North Korean IT worker infiltration poses a serious cybersecurity risk—using fake identities, remote access, and extortion to compromise organizations.
The post North Korea’s IT Operatives Are Exploiting Remote Work Globally appeared… Continue reading North Korea’s IT Operatives Are Exploiting Remote Work Globally

Lazarus Uses ClickFix Tactics in Fake Cryptocurrency Job Attacks

North Korea’s Lazarus hackers are using the ClickFix technique for malware deployment in fresh attacks targeting the cryptocurrency ecosystem.
The post Lazarus Uses ClickFix Tactics in Fake Cryptocurrency Job Attacks appeared first on SecurityWeek.
Continue reading Lazarus Uses ClickFix Tactics in Fake Cryptocurrency Job Attacks

Chinese I-Soon Hackers Hit 7 Organizations in Operation FishMedley

The FishMonger APT group, a subdivision of Chinese cybersecurity firm I-Soon, compromised seven organizations in a 2022 campaign.
The post Chinese I-Soon Hackers Hit 7 Organizations in Operation FishMedley appeared first on SecurityWeek.
Continue reading Chinese I-Soon Hackers Hit 7 Organizations in Operation FishMedley

Mandiant Uncovers Custom Backdoors on End-of-Life Juniper Routers

China-nexus cyberespionage group caught planting custom backdoors on end-of-life Juniper Networks Junos OS routers.
The post Mandiant Uncovers Custom Backdoors on End-of-Life Juniper Routers appeared first on SecurityWeek.
Continue reading Mandiant Uncovers Custom Backdoors on End-of-Life Juniper Routers

How Social Engineering Sparked a Billion-Dollar Supply Chain Cryptocurrency Heist

The $1.4 billion ByBit cryptocurrency heist combined social engineering, stolen AWS session tokens, MFA bypasses and a rigged JavaScript file.
The post How Social Engineering Sparked a Billion-Dollar Supply Chain Cryptocurrency Heist appeared first on … Continue reading How Social Engineering Sparked a Billion-Dollar Supply Chain Cryptocurrency Heist

China Hackers Behind US Treasury Breach Caught Targeting IT Supply Chain

Silk Typhoon APT caught using IT supply chain entry points to conduct reconnaissance, siphon data, and move laterally on victim networks.
The post China Hackers Behind US Treasury Breach Caught Targeting IT Supply Chain appeared first on SecurityWeek.
Continue reading China Hackers Behind US Treasury Breach Caught Targeting IT Supply Chain