Tag: sophisticated attacks
-
Hacker News: The Nearest Neighbor Attack
Source URL: https://www.volexity.com/blog/2024/11/22/the-nearest-neighbor-attack-how-a-russian-apt-weaponized-nearby-wi-fi-networks-for-covert-access/ Source: Hacker News Title: The Nearest Neighbor Attack Feedly Summary: Comments AI Summary and Description: Yes **Summary:** The text discusses the Nearest Neighbor Attack, a novel cyber-espionage technique utilized by the Russian APT group GruesomeLarch to access targets remotely via compromised Wi-Fi networks of nearby organizations. It highlights the importance of strengthening…
-
Krebs on Security: FBI: Spike in Hacked Police Emails, Fake Subpoenas
Source URL: https://krebsonsecurity.com/2024/11/fbi-spike-in-hacked-police-emails-fake-subpoenas/ Source: Krebs on Security Title: FBI: Spike in Hacked Police Emails, Fake Subpoenas Feedly Summary: The Federal Bureau of Investigation (FBI) is urging police departments and governments worldwide to beef up security around their email systems, citing a recent increase in cybercriminal services that use hacked police email accounts to send unauthorized…
-
The Register: Russian spies use remote desktop protocol files in unusual mass phishing drive
Source URL: https://www.theregister.com/2024/10/30/russia_wrangles_rdp_files_in/ Source: The Register Title: Russian spies use remote desktop protocol files in unusual mass phishing drive Feedly Summary: The prolific Midnight Blizzard crew cast a much wider net in search of scrummy intel Microsoft says a mass phishing campaign by Russia’s foreign intelligence services (SVR) is now in its second week, and…
-
Cisco Talos Blog: Threat actor abuses Gophish to deliver new PowerRAT and DCRAT
Source URL: https://blog.talosintelligence.com/gophish-powerrat-dcrat/ Source: Cisco Talos Blog Title: Threat actor abuses Gophish to deliver new PowerRAT and DCRAT Feedly Summary: Cisco Talos recently discovered a phishing campaign using an open-source phishing toolkit called Gophish by an unknown threat actor. AI Summary and Description: Yes Summary: The text details the analysis of a sophisticated phishing campaign…