Sunburst’s C2 Secrets Reveal Second-Stage SolarWinds Victims
Examining the backdoor’s DNS communications led researchers to find a government agency and a big U.S. telco that were flagged for further exploitation in the spy campaign.
Read MoreExamining the backdoor’s DNS communications led researchers to find a government agency and a big U.S. telco that were flagged for further exploitation in the spy campaign.
Read MoreCybercriminals try to steal the credentials of top companies associated with the COVID-19 vaccine supply chain in an espionage effort.
Read MoreIn a recent cyberattack against an E.U. country’s Ministry of Foreign Affairs, the Crutch backdoor leveraged Dropbox to exfiltrate sensitive documents.
Read MoreThe Linux-targeted code can steal phone-call metadata, likely in spy campaigns or for use in VoIP fraud.
Read MoreThe popular Autodesk software was exploited in a recent cyberespionage campaign against an international architectural company.
Read MoreThe group has added a management console and a USB worming function to its main malware, Crimson RAT.
Read MoreThe group has added a management console and a USB worming function to its main malware, Crimson RAT.
Read MoreThe APT is becoming more sophisticated over time.
Read MoreThe groups, all tied to the Winnti supply-chain specialist gang, were seen using the same Linux rootkit and backdoor combo.
Read MoreThe groups, all tied to the Winnti supply-chain specialist gang, were seen using the same Linux rootkit and backdoor combo.
Read MoreBy continuing to use the site, you agree to the use of cookies. more information
The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.