admin

admin

Patchwork Hackers Target Chinese Universities and Research Institutions Using EyeShell Backdoor

Date: July 31, 2023
Category: Cyber Espionage / Malware

A recent campaign has revealed that the hacking group known as Patchwork is actively targeting universities and research organizations in China. According to the KnownSec 404 Team, these attacks leverage a backdoor named EyeShell. Also referred to as Operation Hangover or Zinc Emerson, Patchwork is believed to operate on behalf of India and has been active since at least December 2015. Their attacks primarily focus on Pakistan and China, employing custom malware such as BADNEWS, typically via spear-phishing and watering hole techniques. This group exhibits tactical similarities with other Indian-affiliated cyber-espionage collectives, like SideWinder and the DoNot Team. In a related development, Meta announced in May that it had suspended 50 accounts on Facebook and Instagram connected to Patchwork, which exploited rogue messaging apps.

Patchwork Hackers Target Chinese Research Institutions with EyeShell Backdoor On July 31, 2023, cybersecurity analysts from the KnownSec 404 Team reported that cyber espionage threats linked to a group known as Patchwork have been actively targeting universities and research organizations…

The Future’s AI-Powered Machine Gun Has Arrived

In response to the escalating threat posed by low-cost weaponized drones targeting American forces overseas, the U.S. military is intensifying its efforts to safeguard troops from aerial attacks. Amid this urgent situation—which includes the exploration of costly weaponry, advanced directed…

APT31 Linked to Cyberattacks on Air-Gapped Systems in Eastern Europe

August 01, 2023
Cyber Attack / Data Security

A Chinese-affiliated nation-state actor is under suspicion for a series of cyberattacks targeting industrial organizations in Eastern Europe last year, aimed at extracting information from air-gapped systems. Cybersecurity firm Kaspersky has attributed these intrusions with medium to high confidence to the hacking group known as APT31, which is also recognized by the aliases Bronze Vinewood, Judgement Panda, and Violet Typhoon (previously Zirconium). This conclusion is based on shared tactics observed in the attacks. The intrusions involved over 15 different implants and their variants, categorized into three primary functions: establishing persistent remote access, collecting sensitive data, and transmitting the stolen information to infrastructure controlled by the attackers. Notably, one type of implant appeared to be an advanced modular malware, designed to profile removable drives and infect them with a worm to extract data from isolated air-gapped networks.

China’s APT31 Linked to Data Breaches in Eastern Europe’s Industrial Sector In a developing cybersecurity crisis, it has been reported that a state-sponsored hacking group with ties to China has been implicated in a series of targeted attacks on industrial…

Fundamentals of Sustainability Data Management

We Appreciate Your Registration with ISMG Enhance your profile and keep informed Title LevelAnalytics/Architecture/EngineeringAttorney / General Counsel / CounselAVPBoard of DirectorC – levelC Level – OtherCCOCEO / PresidentCFOChairpersonCIOCISO / CSOCISO/CSO/CIOCOOCROCTODirectorEVP / SVP / FVPHeadHealthcare ProfessionalManagerManager / SupervisorPartnerSpecialist/OtherStaffVP–Other Title Level– Job…

Researchers Uncover Cyber Campaign by Space Pirates Targeting Organizations in Russia and Serbia

August 1, 2023
Cyber Attack / Malware

The cyber threat group known as Space Pirates has been implicated in attacks on at least 16 organizations across Russia and Serbia in the past year, utilizing innovative tactics and expanding their cyber arsenal. According to a detailed report from Positive Technologies released last week, the group’s primary objectives remain espionage and the theft of sensitive information, but they have broadened both their targets and geographical reach. The affected entities include government agencies, educational institutions, private security firms, aerospace manufacturers, agricultural producers, and companies in the defense, energy, and healthcare sectors. Space Pirates was initially identified by Positive Technologies in May 2022, specifically for its attacks on the aerospace industry in Russia. The group is believed to have been active since at least late 2019 and is linked to another cyber adversary tracked by Symantec under the name Webworm. Positive Technologies’ investigation into these attacks reveals further insights into the group’s methods and targets.

Space Pirates’ Cyber Operations Targeting Organizations in Russia and Serbia Unveiled In a troubling revelation, researchers from Positive Technologies have identified a series of cyber attacks conducted by a threat actor known as Space Pirates, targeting at least 16 organizations…