Chinese Ad company Yingmob âs developers are allegedly responsible for the infection of approximately 10 million Android devices. Chinese Ad company Yingmobâs developers are allegedly responsible for the infection of approximately 10 million Android devices which is reportedly generating an income of around $300,000 USD per month. CheckPoint, the security company famous for their network […]
According to the experts from FireEye attacks from China against the US started declining in mid-2014 and has continued to decrease, why? Earlier this week, FireEye released a report showing a significant decline in cyber-attacks originating from China. According to the report, the attacks started declining in mid-2014 and has continued. According to FireEye, the […]
PaloAlto Networks has spotted a new campaign conducted by the Wekby APT that leverages on a malware that uses DNS requests for C2 communications. Security experts at Palo Alto Networks have spotted a China-linked APT group that has been using a strain of malware that leverages DNS requests for command and control (C&C) communications. The group […]
Security experts from PaloAlto Networks collected evidence that the Operation Ke3chang discovered by FireEye in 2013 is still ongoing. Back in 2013, the security researchers at FireEye spotted a group of China-Linked hackers that conducted an espionage campaign on foreign affairs ministries in Europe. The campaign was named ‘Operation Ke3chang,’ now threat actors behind the […]
A Tennessee Valley Authority senior manager, with access to sensitive information about nuclear development and production admits China paid him for secrets The Peopleâs Republic of China (PRC) has been conducting military and commercial espionage for quite some time against the United States, as well as other countries, in an attempt to capture sensitive intellectual […]
Experts analyzed a dozen attacks that leveraged on malicious RTF documents created using the same Four Element Sword builder. Security experts at Arbor Networksâ Security Engineering and Response Team (ASERT) have spotted a tool used in advanced persistent threat (APT) attacks against organizations in East Asia. The researchers have analyzed a dozen attacks that leveraged on malicious Rich […]
Kaspersky has analyzed the interaction between the Russian and Brazilian criminal underground communities revealing a dangerous interaction. In the past weeks, we have analyzed the evolution of cyber criminal communities worldwide, focusing on illicit activities in the Deep Web. To simplify the approach we have considered the principal cyber criminal communities (Russia, Brazil, North America, Japan, China, Germany) as separated entities, instead, these ecosystems interact […]
A Chinese national pleaded guilty yesterday, March 23, on charges with hacking trade secrets from US defense contractors. A Chinese national pleaded guilty yesterday, March 23, on charges with hacking trade secrets from US defense contractors. The man, Su Bin (also known as Stephen Su and Stephen Subin), 50, had been charged in a 2014 indictment with […]
TrendMicro published an interesting analysis of the principal cyber criminal underground communities in the Deep Web worldwide. A new interesting report published by the experts at TrendMicro highlights the differences between the principal underground ecosystems worldwide. Thinking of a unique âglobalâ underground ecosystem is an error, every community has its own characteristics, the criminal crews that […]
Project Cumulus – A group of experts at Bitglass used watermarks to track data through the Dark Web and discover how far do phished credentials get. In April 2015, a group of experts at Bitglass used watermarks to track data through the Deep Web and discover how far does it get after a data breach. The experts discovered […]