Infosecurity.US

Information Security & Occasional Forays Into Adjacent Realms

  • Web Log

Image Via

New APT Report: The Unknown Knowns

April 29, 2020 by Marc Handelman in Information Security, APT, Must Read

via the erudite Catalin Cimpanu (formerly reporting at BleepingComputer, now writing at ZDNet's ZDNet's ZeroDay blog) comes well-crafted and detailed reporting, targeting the recent identification of APT group called-out in the 2017 Shadow Brokers data dump (well known as the Lost in Translation dump)... Today's Must Read.

"Juan Andres Guerrero-Saade, a former security researcher at Kaspersky and Google, says that after identifying files linked to this signature, he believes signature #37 is actually for tracking a new hacking group altogether, which he believes might be based in Iran." - via Catalin Cimpanu writing at ZDNet's ZeroDay blog

April 29, 2020 /Marc Handelman
Information Security, APT, Must Read

Illustration from the Kaspersky Labs Document.

Six Years The Lurker →

March 12, 2018 by Marc Handelman in Vulnerable Systems, Vulnerability Research, Vulnerabilities, Attack Analysis, APT

Dan Goodin, writing at ArsTechnica, provides us with the surreptitious history of the malice-filled code-miscreant APT monikered Slingshot; of which, is apparently an alternatative mwthod of describing the devil's offspring in code-complete form. More, here.

"The researchers still don't know precisely how Slingshot initially infected all its targets. In several cases, however, Slingshot operators got access to routers made by Latvian manufacturer MikroTik and planted a malicious code in it." - via Dan Goodin, slaving away over a sizziling keyboard at ArsTechica

March 12, 2018 /Marc Handelman
Vulnerable Systems, Vulnerability Research, Vulnerabilities, Attack Analysis, APT

Over One Billion Served →

February 17, 2015 by Marc Handelman in All is Information, Cybernetic Crime, Data Security, Database Security, Financial Security, Information Security, Must Read, Network Security, Security Failure, Security Governance, Bank Security, Social Engineering, Behavioral Security, APT, Persistent Threats, Moles

Suprised by the largest heist in history? Concerned about Carbanak APT? Clearly, proof-positive that advanced persistent threats are deeply evil - and highly efficient when coupled with other complimentary and stealth-like methodologies (aka Hiding in Plain Sight). Read on...

February 17, 2015 /Marc Handelman
All is Information, Cybernetic Crime, Data Security, Database Security, Financial Security, Information Security, Must Read, Network Security, Security Failure, Security Governance, Bank Security, Social Engineering, Behavioral Security, APT, Persistent Threats, Moles