Pro-Russian hackers launch DDoS attacks against Romanian govt
The attackers used compromised network equipment outside Romania to launch DDoS attacks.
The attackers used compromised network equipment outside Romania to launch DDoS attacks.
The hacked websites contain a malicious JavaScript code, which generates malicious traffic to a list of URL addresses included in the code.
The advisory now includes additional IoCs for WhisperGate and technical details for HermeticWiper, IsaacWiper, HermeticWizard, and CaddyWiper malware.
The attacks were orchestrated by threat actors linked to the Russian military intelligence service, including APT28, Sandworm, Gamaredon, EnergeticBear, and Turla.
In March, Ukraine's Minister of Digital Transformation Mykhailo Fedorov asked DJI to "block products that are helping Russia to kill the Ukrainians."
Attackers can use the vulnerability to deploy ransomware or cryptomining malware as part of initial access, lateral movement, or privilege escalation.
The country’s president Carlos Alvarado Quesada said that the attack was meant to “threaten the stability of the country in a transition situation.”
The hacker group compromised T-Mobile systems several times in March and stole source code for a range of company projects.
The stamp went for sale just two days before Moskva, the flagship of Russia’s Black Sea fleet sank after it was struck with Ukrainian-made Neptune missiles.
Nearly 1 in 3 identified actors exploiting zero-days in 2021 was financially motivated.
Showing elements 2571 - 2580