DeathStalker threat group spies on small and medium businesses
The group does not appear to be motivated by financial gain, instead, DeathStalker is focused on sensitive business data.
The group does not appear to be motivated by financial gain, instead, DeathStalker is focused on sensitive business data.
The researchers advise AWS customers that choose community AMIs to verify, terminate, or seek AMIs from trusted sources for their EC2 instances.
Over the past year, the hackers considerably upgraded their tools.
The BLINDINGCAN RAT comes with built-in functions for remote operations that provide various capabilities on a victim’s system.
The company said it detected a ransomware attack due to which a portion of one brand’s information technology systems was encrypted.
This is the first worm observed that contains such AWS specific functionality.
The stolen data allegedly includes confidential information about employees, company agreements, contracts, financial statements, and internal correspondence.
The malware has been used by the Fancy Bear hacker group in attacks aiming to compromise sensitive networks.
The cyber criminals attempted to gain access to Israeli defence databases by creating fake identities.
Some similarities with previously discovered exploits suggest that the DarkHotel APT may be the culprit behind the attacks.
Showing elements 3511 - 3520