The experts at EFF organization speculate that Russian State-sponsored hackers belonging the APT 28 group have managed the last EFF Spear phishing Scam. Attackers, alleged to belong to a Russian state-sponsored APT registered a bogus Electronic Frontier Foundation domain earlier this month. The hackers used the name brand of popular privacy watchdog in an attempt to trick […]
Security experts at FireEye uncovered a cyber espionage campaign that targeted organizations in India and the Tibetan activists. Security firm FireEye revealed an intense activity of hackers based in China particularly interested in entities and organization linked to the Indian Government as well as in information on Tibetan activists. Also in this case we are dealing […]
Security experts at Kaspersky Lab have analyzed the cyber attacks run by the Blue Termite APT, a hacking crew group focused on Japanese organizations. According to the experts at Kaspersky security firm, an ATP group dubbed Blue Termite has been active since at least November 2013 focusing its attacks on Japanese organizations. The Blue Termite APT […]
A senior U.S. intelligence official revealed that Chinese hackers have accessed the private emails of “many” top Obama administration officials. According to an official of the US intelligence, Chinese hackers have accessed the private emails of “many” top members of the Obama administration. The news was reported by the NBC News which obtained a top […]
The Panda Emissary group extensively uses long-running strategic web compromises and relies on whitelists to syphon defence aerospace projects from victims. An alleged Chinese APT group dubbed Panda Emissary (also known as TG-3390) is targeting high-profile governments and organisations searching for defense aerospace projects. Researchers at Dell discovered that the Panda Emissary group used Watering hole […]
The NBC News published a secret NSA map reporting the locations of “Victims of Chinese Cyber Espionage” attacks that resulted in data thefts. The NBC News has published in exclusive a secret NSA map showing the locations of the cyber attacks carried out by Chinese hackers over a five-year period. Every marker in the secret NSA map […]
ESET issued a report on a cyber espionage campaign dubbed Operation Potao that relied on the diffusion of a trojanized Russian language version of TrueCrypt. Despite TrueCrypt development was mysteriously interrupted last year, the popular open-source encryption tool still represents the ideal choice for individuals that need to encrypt their data. Recently ESET published an interesting report […]
Experts at FireEye discovered a new APT group dubbed APT 29 that is exploiting Twitter to mask the activities of their data-stealer malware. Experts at FireEye uncovered a group of alleged Russian hackers, dubbed APT 29, that is exploiting Twitter to mask the activities of their data-stealer malware. The hackers belonging to the APT 29 […]
A sophisticated APT group who targeted the White House and State Department, have launched a new stealth spear phishing campaign on the Pentagon. The Daily Beast has revealed that he got the proof that the White House and State Department were hacked by a sophisticated Russian APT. The newspaper that published the news in exclusive has run […]
According to new revelations of the popular whistleblower Edward Snowden the powerful spying machine XKEYSCORE runs on Red Hat Enterprise Linux. In August 2013, Edward Snowden revealed the existence if a tool named DNI Presenter that allows the Agency to read the content of stored emails, and it also enables the intelligence analysts to tool collects […]