Turla living off other cybercriminals’ tools in order to attack Ukrainian targets

A Russian nation-state threat actor has been observed leveraging tools from other cybercriminal groups to compromise targets in Ukraine, a recent report by Microsoft Threat Intelligence disclosed. This clandestine approach, which is the second time in as many weeks that Microsoft has highlighted the group’s effort, shows how Turla uses a wide range of attack […]

The post Turla living off other cybercriminals’ tools in order to attack Ukrainian targets appeared first on CyberScoop.

Continue reading Turla living off other cybercriminals’ tools in order to attack Ukrainian targets

Russian-linked Turla caught using Pakistani APT infrastructure for espionage

Both Microsoft and Lumen’s BlackLotus Labs found Turla spying on Afghanistan and India via Pakistani infrastructure.

The post Russian-linked Turla caught using Pakistani APT infrastructure for espionage appeared first on CyberScoop.

Continue reading Russian-linked Turla caught using Pakistani APT infrastructure for espionage

IT threat evolution in Q2 2023

Q2 2023 overview: targeted attacks such as Operation Triangulation, CloudWizard and Lazarus activity, Nokoyawa ransomware, and others. Continue reading IT threat evolution in Q2 2023

APT trends report Q1 2023

For more than five years, the Global Research and Analysis Team (GReAT) at Kaspersky has been publishing quarterly summaries of advanced persistent threat (APT) activity. These summaries are based on our threat intelligence research; and they provide a representative snapshot of what we have published and discussed in greater detail in our private APT reports. Continue reading APT trends report Q1 2023

APT trends report Q1 2023

For more than five years, the Global Research and Analysis Team (GReAT) at Kaspersky has been publishing quarterly summaries of advanced persistent threat (APT) activity. These summaries are based on our threat intelligence research; and they provide a representative snapshot of what we have published and discussed in greater detail in our private APT reports. Continue reading APT trends report Q1 2023

Tomiris called, they want their Turla malware back

We continued to track Tomiris as a separate threat actor over three new attack campaigns between 2021 and 2023, and our telemetry allowed us to shed light on the group. In this blog post, we’re excited to share what we now know of Tomiris with the broader community, and discuss further evidence of a possible connection to Turla. Continue reading Tomiris called, they want their Turla malware back

Notorious Russian hacking group appears to resurface with fresh cyberattacks on Ukraine

The group’s first known activity in Ukraine after Russia’s invasion registered dormant domains in order to obscure their attacks.

The post Notorious Russian hacking group appears to resurface with fresh cyberattacks on Ukraine appeared first on CyberScoop.

Continue reading Notorious Russian hacking group appears to resurface with fresh cyberattacks on Ukraine

App Meant to Hit Russia with DDoS Attack Infected Android Phones of Ukraine Activists

By Deeba Ahmed
The pro-Ukraine groups thought they were fighting back against Russia with a new DDoS app, but it turns…
This is a post from HackRead.com Read the original post: App Meant to Hit Russia with DDoS Attack Infected Android Phones of U… Continue reading App Meant to Hit Russia with DDoS Attack Infected Android Phones of Ukraine Activists