Plato Data Intelligence.
Vertical Search & Ai.

Tag: Iranian

Iranian Hackers Using New Marlin Backdoor in ‘Out to Sea’ Espionage Campaign

An advanced persistent threat (APT) group with ties to Iran has refreshed its malware toolset to include a new backdoor dubbed Marlin as part of a long-running espionage campaign that started in April 2018. Slovak cybersecurity company ESET attributed the attacks — codenamed "Out to Sea" — to a threat actor called OilRig (aka APT34), while also conclusively connecting its activities to a second

Russian APT Hackers Used COVID-19 Lures to Target European Diplomats

The Russia-linked threat actor known as APT29 targeted European diplomatic missions and Ministries of Foreign Affairs as part of a series of spear-phishing campaigns mounted in October and November 2021. According to ESET's T3 2021 Threat Report shared with The Hacker News, the intrusions paved the way for the deployment of Cobalt Strike Beacon on compromised systems, followed by leveraging the

Cyber Terrorism Is a Growing Threat & Governments Must Take Action

With its benefits of deniability, relatively low costs, and the ability to attack from anywhere, cyber terrorism will increasingly threaten civilians everywhere.

Is Volcano Energy Really The Best Fit For El Salvador’s Bitcoin City?

While a plan to leverage “volcano energy” is great marketing for El Salvador’s planned Bitcoin City, on its own, it might not be the best source.

Chinese Hackers Target Financial Institutions in Taiwan With Custom Backdoor

Between 2020 and 2021, a China-linked advanced persistent threat (APT) actor ran an espionage campaign targeting financial institutions in Taiwan, Symantec reports.

Tracked as Antlion, the hacking group is believed to have been active since at least 2011, and is likely backed by the Chinese government.

read more

Charming Kitten Sharpens Its Claws with PowerShell Backdoor

The notorious Iranian APT is fortifying its arsenal with new malicious tools and evasion tactics and may even be behind the Memento ransomware.

Hacker Group ‘Moses Staff’ Using New StrifeWater RAT in Ransomware Attacks

A politically motivated hacker group tied to a series of espionage and sabotage attacks on Israeli entities in 2021 incorporated a previously undocumented remote access trojan (RAT) that masquerades as the Windows Calculator app as part of a conscious effort to stay under the radar. Cybersecurity company Cybereason, which has been tracking the operations of the Iranian actor known as Moses Staff

Newly Detected “StrifeWater” RAT Linked to Iranian APT

The Iranian threat group known as Moses Staff was first spotted in October 2021. It claims its purpose is to harm Israeli companies by leaking sensitive stolen data, but it has also been seen targeting a variety of industries in countries such as Italy, India, Germany, Chile, Turkey, UAE and the U.S.

read more

Iranian Hackers Using New PowerShell Backdoor in Cyber Espionage Attacks

An advanced persistent threat group with links to Iran has updated its malware toolset to include a novel PowerShell-based implant called PowerLess Backdoor, according to new research published by Cybereason. The Boston-headquartered cybersecurity company attributed the malware to a hacking group known as Charming Kitten (aka Phosphorous, APT35, or TA453), while also calling out the backdoor's

Researchers Uncover New Iranian Hacking Campaign Targeting Turkish Users

Details have emerged about a previously undocumented malware campaign undertaken by the Iranian MuddyWater advanced persistent threat (APT) group targeting Turkish private organizations and governmental institutions. "This campaign utilizes malicious PDFs, XLS files and Windows executables to deploy malicious PowerShell-based downloaders acting as initial footholds into the target's enterprise,"

Cybereason Identifies New Malware Variants Used in Global Iranian…

Newly discovered StrifeWater RAT and PowerLess Backdoor highlight recent uptick in Iranian cyber offensive operations

(PRWeb February 01, 2022)

Read the full story at https://www.prweb.com/releases/cybereason_identifies_new_malware_variants_used_in_global_iranian_espionage_campaigns/prweb18470538.htm

The Bank of Korea completes its first phase of a two-step mock test of the feasibility of its CBDC.

The Bank of Korea (BOK) said Monday it has successfully completed its first phase of a two-step mock test of the feasibility of a central bank digital currency (CBDC) as it is reviewing whether to introduce the potential new form of money. The central bank launched the first phase in August last year and completed […]

Latest Intelligence

spot_img
spot_img
spot_img

Chat with us

Hi there! How can I help you?