Twenty-three SUNBURST Targets Identified

Remember when Igor Kuznetsov and Costin Raiu announced that two of the victims in FireEye’s SUNBURST IOC list were ***net.***.com and central.***.gov on Kaspersky’s Securelist blog in December? Reuters later reported that these victims were Cox Communi… Continue reading Twenty-three SUNBURST Targets Identified

Turla APT Used WhiteBear Espionage Tools Against Defense Industry, Embassies

The Turla APT’s WhiteBear toolset was used to attack defense organizations as recently as June, and diplomatic targets in Europe, Asia and South America during most of 2016. Continue reading Turla APT Used WhiteBear Espionage Tools Against Defense Industry, Embassies

FruityArmor APT Group Used Recently Patched Windows Zero Day

The FruityArmor APT group was using one of the Windows zero days patched by Microsoft last week to escape sandboxes and carry out targeted attacks. Continue reading FruityArmor APT Group Used Recently Patched Windows Zero Day

StrongPity APT Covets Secrets of Crypto Users

Kaspersky Lab researchers have uncovered the StrongPity APT, a group that uses watering hole attacks to infect machines of users seeking encryption technologies such as WinRAR and TrueCrypt. Continue reading StrongPity APT Covets Secrets of Crypto Users

ShadowBrokers’ Leak Has ‘Strong Connection’ to Equation Group

Researchers at Kaspersky Lab said there is a strong connection between the ShadowBrokers cache of exploits and those belonging to the Equation Group. Continue reading ShadowBrokers’ Leak Has ‘Strong Connection’ to Equation Group

APT Groups Finding Success with Patched Microsoft Flaw

Researchers at Kaspersky Lab have identified six APT groups using exploits for a Microsoft Office flaw that was patched in September 2015. Continue reading APT Groups Finding Success with Patched Microsoft Flaw