Tag: advanced persistent threat

  • The Register: Chinese snoops use stealth RAT to backdoor US orgs – still active last week

    Source URL: https://www.theregister.com/2025/04/15/chinese_spies_backdoored_us_orgs/ Source: The Register Title: Chinese snoops use stealth RAT to backdoor US orgs – still active last week Feedly Summary: Let the espionage and access resale campaigns begin (again) A cyberspy crew or individual with ties to China’s Ministry of State Security has infected global organizations with a remote access trojan (RAT)…

  • The Register: China’s FamousSparrow flies back into action, breaches US org after years off the radar

    Source URL: https://www.theregister.com/2025/03/27/china_famoussparrow_back/ Source: The Register Title: China’s FamousSparrow flies back into action, breaches US org after years off the radar Feedly Summary: Crew also cooked up two fresh SparrowDoor backdoor variants, says ESET The China-aligned FamousSparrow crew has resurfaced after a long period of presumed inactivity, compromising a US financial-sector trade group and a…

  • Cisco Talos Blog: UAT-5918 targets critical infrastructure entities in Taiwan

    Source URL: https://blog.talosintelligence.com/uat-5918-targets-critical-infra-in-taiwan/ Source: Cisco Talos Blog Title: UAT-5918 targets critical infrastructure entities in Taiwan Feedly Summary: UAT-5918, a threat actor believed to be motivated by establishing long-term access for information theft, uses a combination of web shells and open-sourced tooling to conduct post-compromise activities to establish persistence in victim environments for information theft and…

  • CSA: How Can You Defend Against APTs?

    Source URL: https://cloudsecurityalliance.org/blog/2025/03/17/top-threat-11-apt-anxiety-battling-the-silent-threats Source: CSA Title: How Can You Defend Against APTs? Feedly Summary: AI Summary and Description: Yes Summary: The text discusses Advanced Persistent Threats (APTs) in the context of cloud security, highlighting their sophisticated nature and significant impacts on businesses. It outlines various mitigation strategies essential for organizations facing these threats. Detailed Description:…

  • Slashdot: Chinese Hackers Sat Undetected in Small Massachusetts Power Utility for Months

    Source URL: https://it.slashdot.org/story/25/03/13/229240/chinese-hackers-sat-undetected-in-small-massachusetts-power-utility-for-months?utm_source=rss1.0mainlinkanon&utm_medium=feed Source: Slashdot Title: Chinese Hackers Sat Undetected in Small Massachusetts Power Utility for Months Feedly Summary: AI Summary and Description: Yes Summary: The text describes a cybersecurity breach at the Littleton Electric Light and Water Departments (LELWD), involving state-sponsored hackers from a group known as Volt Typhoon. Cybersecurity firm Dragos, in collaboration…

  • The Register: Sidewinder goes nuclear, charts course for maritime mayhem in tactics shift

    Source URL: https://www.theregister.com/2025/03/10/sidewinder_tactics_shift/ Source: The Register Title: Sidewinder goes nuclear, charts course for maritime mayhem in tactics shift Feedly Summary: Phishing and ancient vulns still do the trick for one of the most prolific groups around Researchers say the Sidewinder offensive cyber crew is starting to target maritime and nuclear organizations.… AI Summary and Description:…

  • Hacker News: Undocumented backdoor found in Bluetooth chip used by a billion devices

    Source URL: https://www.bleepingcomputer.com/news/security/undocumented-backdoor-found-in-bluetooth-chip-used-by-a-billion-devices/ Source: Hacker News Title: Undocumented backdoor found in Bluetooth chip used by a billion devices Feedly Summary: Comments AI Summary and Description: Yes Summary: The discovery of an undocumented backdoor in the widely used ESP32 microchip presents significant security risks, especially in IoT devices. This backdoor allows for device spoofing, unauthorized access,…

  • The Register: Feds name and charge alleged Silk Typhoon spies behind years of China-on-US attacks

    Source URL: https://www.theregister.com/2025/03/06/fbi_china_pays_75k_per/ Source: The Register Title: Feds name and charge alleged Silk Typhoon spies behind years of China-on-US attacks Feedly Summary: Xi’s freelance infosec warriors apparently paid up to $75K to crack a single American inbox US government agencies announced Wednesday criminal charges against alleged members of China’s Silk Typhoon gang, plus internet domain…

  • Slashdot: Microsoft Warns of Chinese Hackers Spying on Cloud Technology

    Source URL: https://slashdot.org/story/25/03/05/1743246/microsoft-warns-of-chinese-hackers-spying-on-cloud-technology?utm_source=rss1.0mainlinkanon&utm_medium=feed Source: Slashdot Title: Microsoft Warns of Chinese Hackers Spying on Cloud Technology Feedly Summary: AI Summary and Description: Yes Summary: Microsoft’s report on the Silk Typhoon hacking group emphasizes how advanced persistent threats (APTs) are increasingly targeting cloud applications and remote management tools to conduct supply-chain attacks. The activities of this group…