Blog News APT -
Úvod APT blog Attack blog BigBrother blog BotNet blog Bug blog Cyber blog Cryptocurrency blog Exploit blog Hacking blog Hardware blog ICS blog Incident blog IoT blog Malware blog OS Blog Phishing blog Ransomware blog Safety blog Security blog Social blog Spam blog Vulnerebility blog
|APT39: An Iranian Cyber Espionage Group Focused on Personal Information||APT39 is an Iranian cyber espionage group responsible for widespread theft of personal information.||APT blog|
|28.1.19||The Advanced Persistent Threat files: APT10||While security companies are getting good at analyzing the tactics of nation-state threat actors, they still struggle with placing these actions in context and making solid risk assessments. So in this series, we're going to take a look at a few APT groups, and see how they fit into the larger threat landscape—starting with APT10.||APT blog||Malwarebytes|
FireEye assesses APT33 may be behind a series of intrusions and attempted intrusions within the engineering industry.
|New Strain of Olympic Destroyer Droppers||Over the last few weeks, we have noticed new activity from Hades, the APT group behind the infamous Olympic Destroyer attack. Moreover, this new wave of attack shares a lot with those previously attributed to the group but it seems that this time we are witnessing significant changes that may hint at a new evolution from the group.||APT blog||Checkpoint|
|9.11.18||FASTCash: How the Lazarus Group is Emptying Millions from ATMs||On October 2, 18, an alert was issued by US-CERT, the Department of Homeland Security, the Department of the Treasury, and the FBI. According to this new alert, Hidden Cobra (the U.S. government’s code name for Lazarus) has been conducting “FASTCash” attacks, stealing money from Automated Teller Machines (ATMs) from banks in Asia and Africa since at least 2016.||APT blog||Symantec|
|25.10.18||GreyEnergy: Updated arsenal of one of the most dangerous threat actors||ESET research reveals a successor to the infamous BlackEnergy APT group targeting critical infrastructure, quite possibly in preparation for damaging attacks||APT blog|
|25.10.18||APT38: Details on New North Korean Regime-Backed Threat Group||We release details on APT38, a threat group we believe is responsible for conducting financial crime on behalf of the North Korean regime, stealing millions of dollars from banks worldwide.||APT blog||FireEye|
Interactive Mapping of APT-C-23
Research by: Aseel Kayal Last month, we investigated the renewal of a targeted attack against the Palestinian Authority, attributed to the APT-C-23 threat group. Although this campaign was initially discovered in early 2017,...
In July 18, FireEye devices detected and blocked what appears to be APT10 (Menupass) activity targeting the Japanese media sector.