News

Olympic Destroyer Malware was Used in Attack on Winter Olympics Opening Ceremony

Delaware, USA – February 13, 2018 – During the opening ceremony of the 2018 Winter Olympics, unknown threat actor performed a cyberattack on the event’s infrastructure. During the attack, hackers managed to shut down the Olympics website for 12 hours and also caused failures in the work of WiFi and digital television. Researchers from Cisco […]

SOC Prime Honored with Cybersecurity Excellence Awards

Delaware, USA – February 12, 2018 – SOC Prime, a fast-growing cybersecurity vendor, has been recognized as the winner at the annual Cybersecurity Excellence Awards and received two Bronze trophies. The Cybersecurity Excellence Awards honor individuals and companies that demonstrate excellence, innovation, and leadership in information security. The winners of each nomination were determined based […]

Iron Tiger APT Returns to Cyber Espionage

Delaware, USA – February 9, 2018 – Iron Tiger APT group is back in business. Researchers from Bitdefender discovered a cyber espionage campaign targeted the government, technology and telecommunications sectors in Asia and North America. They dubbed it Operation PZChao. Uncovered infrastructure and malware used allowed researchers to link this campaign to infamous Chinese hacker […]

Smominru and DDG Botnets Infected Thousands of Web Servers

Delaware, USA – February 8, 2018 – In early February, researchers published information about the two largest botnets, active since the second quarter of 2017. Smominru and DDG botnets are mining Monero cryptocurrency providing their operators with a significant profit. Researchers from Proofpoint claim that the Smominru botnet, which appeared in May 2017, infected more […]

Metasploit Framework Uses Modified NSA Exploits

Delaware, USA – February 7, 2018 – The researcher from RiskSense created Metasploit Framework – an open source tool for penetration tests. Sean Dillon, also known as zerosum0x0, has modified the code for several NSA exploits so that they can work on a wide range of MS Windows-based systems, starting with Windows 2000. Vulnerabilities CVE-2017-0143 […]

Dangerous Vulnerability in Flash Player

Delaware, USA – February 2, 2018 – Two days ago, South Korean CERT reported a zero-day vulnerability in Flash Player exploited by North Korean hackers for more than two months. Adobe promises to release updates only on Monday, February 5. The list of vulnerable products can be found at: https://helpx.adobe.com/security/products/flash-player/apsa18-01.html Vulnerability CVE-2018-4878 allows adversaries to […]

Meltdown & Spectre: from PoC to the First Malware Samples

Delaware, USA – February 1, 2018 – Less than a month after the first publications about the vulnerabilities Meltdown & Spectre, AV-Test team discovered about 140 attempts to create full-fledged malware that exploits Meltdown and Spectre vulnerabilities. Researchers at Fortinet claim that the detected samples contain PoC code published in early January and are not […]

WannaMine: a New Round of Threat Development

Delaware, USA – January 29, 2018 – CrowdStrike reported in their blog about a new round of WannaMine fileless malware activity. The operations of several companies were almost completely paralyzed due to infection with this virus. WannaMine was first discovered at the end of October 2017 by researchers from PandaLabs, but shortly after detection, its […]

Mezzo Banking Trojan Gathers Financial Data for Further Campaigns

Delaware, USA – January 29, 2018 – Threat actors leverage new Mezzo banking trojan to prepare a large-scale attack. At the moment, this trojan just collects and uploads data to the command and control servers, but it has the functionality to replace the files of financial software, as researchers from Kaspersky Lab report. Malware can […]

Two More Campaigns Spreading Monero Cryptocurrency Miners

Delaware, USA – January 26, 2018 – The growing popularity of the Monero cryptocurrency for operations in Darknet leads to new campaigns distributing various cryptocurrency miners. Adversaries attack both corporate web servers and ordinary users. Browsers started to introduce protection from Javascript miners so last weeks there has been an increase in the number of […]