How Social Engineering Sparked a Billion-Dollar Supply Chain Cryptocurrency Heist

The $1.4 billion ByBit cryptocurrency heist combined social engineering, stolen AWS session tokens, MFA bypasses and a rigged JavaScript file.
The post How Social Engineering Sparked a Billion-Dollar Supply Chain Cryptocurrency Heist appeared first on … Continue reading How Social Engineering Sparked a Billion-Dollar Supply Chain Cryptocurrency Heist

China Hackers Behind US Treasury Breach Caught Targeting IT Supply Chain

Silk Typhoon APT caught using IT supply chain entry points to conduct reconnaissance, siphon data, and move laterally on victim networks.
The post China Hackers Behind US Treasury Breach Caught Targeting IT Supply Chain appeared first on SecurityWeek.
Continue reading China Hackers Behind US Treasury Breach Caught Targeting IT Supply Chain

Freelance Software Developers in North Korean Malware Crosshairs

ESET says hundreds of freelance software developers have fallen victim to North Korean hackers posing as recruiters.
The post Freelance Software Developers in North Korean Malware Crosshairs appeared first on SecurityWeek.
Continue reading Freelance Software Developers in North Korean Malware Crosshairs

Cisco Details ‘Salt Typhoon’ Network Hopping, Credential Theft Tactics

Cisco Talos observed Chinese hackers pivoting from a compromised device operated by one telecom to target a device in another telecom.
The post Cisco Details ‘Salt Typhoon’ Network Hopping, Credential Theft Tactics appeared first on SecurityWeek.
Continue reading Cisco Details ‘Salt Typhoon’ Network Hopping, Credential Theft Tactics

Chinese APT Tools Found in Ransomware Schemes, Blurring Attribution Lines

China-linked cyberespionage toolkits are popping up in ransomware attacks, forcing defenders to rethink how they combat state-backed hackers.
The post Chinese APT Tools Found in Ransomware Schemes, Blurring Attribution Lines appeared first on Security… Continue reading Chinese APT Tools Found in Ransomware Schemes, Blurring Attribution Lines

How Russian Hackers Are Exploiting Signal ‘Linked Devices’ Feature for Real-Time Spying

Mandiant warns that multiple Russian APTs are abusing a nifty Signal Messenger feature to surreptitiously spy on encrypted conversations.
The post How Russian Hackers Are Exploiting Signal ‘Linked Devices’ Feature for Real-Time Spying appea… Continue reading How Russian Hackers Are Exploiting Signal ‘Linked Devices’ Feature for Real-Time Spying