Threat actors distribute GravityRAT malware masqueraded as end-to-end encrypted chat app
The campaign is aimed at high-profile individuals in India, like officers of the Armed Forces.
The campaign is aimed at high-profile individuals in India, like officers of the Armed Forces.
The attack "entirely paralyzed" the plant in El Prat de Llobregat, which produces seven million hectolitres of beer a year.
Fake alerts reached at least 100,000 inboxes, but the number could much higher, as the researchers believe that "the campaign was potentially much, much larger."
Between September 2014 and December 2016, Aleksandr Zhukov operated a fake ad network that stole stole more than $7 million from U.S. companies.
The MACMA malware “seems to be a product of extensive software engineering,” the researchers said.
The new campaign leverages the original IDA Pro 7.5 software bundled with two malicious components.
The hackers obtained an access key, which provided access to a limited subset of information held in the Aruba Central cloud environment.
The group has been active since at least 2015, primarily focusing on cyberespionage and data theft.
Researchers at Palo Alto Networks also spotted the same Chinese group scanning ManageEngine ADSelfService Plus servers from mid-September to early October.
Although SolarWinds released a patch for this vulnerability almost four months ago, the are still over 60% potentially vulnerable Serv-U servers.
Showing elements 2771 - 2780