Articles tagged "APT"

Found 34 articles

A newly identified hacking group, suspected to be linked to Russian intelligence, has launched attacks against various Ukrainian sectors, including defense, government, and energy. This group is using a malware called CANFAIL, which was uncovered by researchers from Google Threat Intelligence Group. The targeting of critical infrastructure and military entities raises significant concerns about national security and the ongoing conflict in the region. As these attacks could disrupt essential services and information systems, the situation highlights the need for enhanced cybersecurity measures among the affected organizations. This incident is part of a broader pattern of cyber warfare tactics being employed against Ukraine.

Impact: Ukrainian defense, government, and energy sectors
Remediation: Organizations should enhance cybersecurity protocols, conduct regular security assessments, and ensure timely updates and patches to their systems.
Read Original
Actively Exploited

A Chinese cyber espionage group known as UNC3886 has been targeting Singapore's telecommunications sector, according to a report from the Cyber Security Agency of Singapore (CSA). Since July 2025, the group has executed a campaign aimed at all four major telecom companies in the country. In response, the CSA and the Infocomm Media Development Authority (IMDA) initiated Operation CYBER GUARDIAN to bolster defenses and protect sensitive information within the telecom industry. This incident raises concerns about the potential for data breaches and the implications for national security, given the critical role that telecommunications play in modern infrastructure. The situation underscores the need for ongoing vigilance and enhanced cybersecurity measures within essential sectors.

Impact: Singapore's telecommunications sector, including all four major telecom companies
Remediation: Operation CYBER GUARDIAN initiated to protect telecom sector
Read Original

Researchers from SafeBreach have reported that an Iranian hacking group known as Infy APT has adapted its tactics by using Telegram for command and control (C2) operations. This shift comes after a period of internet restrictions imposed by the Iranian government, which has since ended, allowing the group to re-establish its online presence. The use of Telegram for C2 indicates a strategic change, making it easier for attackers to communicate and coordinate their activities while potentially evading detection. This development is concerning for organizations that may be targeted by these tactics, as it suggests a more sophisticated approach to cyber espionage and attacks. Keeping an eye on these evolving methods is crucial for cybersecurity professionals in order to protect sensitive information.

Impact: N/A
Remediation: Organizations should monitor for unusual Telegram activity and implement security measures to detect and respond to potential C2 communications.
Read Original

A recent report from Palo Alto Networks reveals that a cyberspy group has successfully targeted governments and critical infrastructure across 37 countries. While the specific origin of these attacks hasn't been confirmed, there are strong indications pointing to China as the likely source. The affected entities include various government agencies and critical infrastructure sectors, which raises significant concerns about national security and the potential for disruption in essential services. The scale of the operation suggests a sophisticated level of planning and execution, highlighting the ongoing risks that nation-states pose in the cyber realm. This incident serves as a reminder for organizations worldwide to bolster their cybersecurity defenses and remain vigilant against such threats.

Impact: Governments and critical infrastructure sectors in 37 countries
Remediation: Organizations should enhance their cybersecurity measures, conduct regular security assessments, and implement monitoring for unusual activity.
Read Original

A new cyber threat known as the PeckBirdy framework has been linked to advanced persistent threats (APTs) associated with China. This framework is particularly targeting gambling and government entities, utilizing JScript and living-off-the-land binaries (LOLBins) to execute attacks across various environments. The implications of these attacks are significant, as they could compromise sensitive information and disrupt operations within the affected sectors. Organizations in the gambling and government sectors should be vigilant and strengthen their security measures to prevent potential breaches. Researchers are continuing to monitor the situation for further developments and potential mitigation strategies.

Impact: Gambling and government entities
Remediation: Organizations should enhance security protocols and monitor for unusual activity. Specific patches or updates were not mentioned.
Read Original
Actively Exploited

The PeckBirdy command-and-control framework has been identified as a tool used by cyber attackers targeting gambling and government sectors across Asia since 2023. Researchers have linked this framework to advanced persistent threats (APTs) that are aligned with Chinese interests, indicating a strategic focus on these industries. The attacks suggest a concerted effort to gather intelligence or disrupt operations within these sectors. As these attacks are ongoing, they pose a significant risk to the affected organizations, potentially leading to data breaches or operational disruptions. The implications of these cyber campaigns highlight the need for enhanced security measures in vulnerable industries.

Impact: Gambling and government sectors in Asia
Remediation: Organizations in affected sectors should enhance their cybersecurity measures, including monitoring network activity and implementing robust access controls.
Read Original

Cybersecurity researchers have identified a JavaScript-based command-and-control framework named PeckBirdy, which has been utilized by China-aligned hackers since 2023. This framework has primarily targeted the Chinese gambling industry, as well as various Asian government entities and private organizations. Trend Micro reports that the flexibility of PeckBirdy allows these attackers to adapt their methods for different environments. The use of such sophisticated tools raises concerns about the security of critical sectors, especially in regions where these attacks are focused. It's crucial for organizations in the affected areas to enhance their security measures to defend against these ongoing threats.

Impact: Chinese gambling industry, Asian government entities, private organizations
Remediation: Organizations should enhance security measures and monitor for unusual activity related to PeckBirdy. Regular updates and employee training on phishing and other attack vectors are recommended.
Read Original

Kaspersky researchers have identified updates to the CoolClient backdoor and the deployment of new tools associated with the HoneyMyte group, also known as Mustang Panda or Bronze President. This group is known for its advanced persistent threat (APT) campaigns, which have now introduced three variants of a browser data stealer. These updates suggest an ongoing effort by attackers to enhance their capabilities and target sensitive data from users. The implications are significant, as organizations and individuals could be at risk of having their personal and financial information stolen. Users are encouraged to remain vigilant and ensure their systems are protected against these evolving threats.

Impact: CoolClient backdoor, browser data stealer variants
Remediation: Users should update their security software, monitor for unusual activity, and consider implementing additional security measures such as multi-factor authentication.
Read Original

Researchers have linked a failed cyberattack on Poland's power grid to the Russian hacking group Sandworm, known for its disruptive wiper attacks on critical infrastructure. This incident marks a significant concern for national security, as it highlights the ongoing threat posed by state-sponsored actors targeting essential services. While the attack did not succeed, it raises alarms about the resilience of power systems and the potential for future incidents that could disrupt energy supplies. As countries like Poland continue to face increasing cyber threats, the need for robust cybersecurity measures becomes even more pressing to protect vital infrastructure from malicious actors.

Impact: Poland's power grid
Remediation: Increase cybersecurity measures for critical infrastructure, conduct regular security assessments, and implement incident response plans.
Read Original

Poland's energy sector recently faced a severe cyber attack attributed to the Russian hacking group Sandworm. This incident involved a wiper malware that aimed to disrupt the functioning of the power grid, posing significant risks to the country's energy stability. Authorities have raised alarms about the potential for further attacks, as Sandworm is known for its destructive tactics and has previously targeted critical infrastructure. The implications of this attack extend beyond Poland, reflecting ongoing geopolitical tensions and the vulnerability of national infrastructures to cyber warfare. As the situation develops, experts urge energy companies to enhance their cybersecurity measures to prevent similar incidents in the future.

Impact: Polish power grid and energy sector
Remediation: Energy companies should enhance cybersecurity measures and conduct thorough risk assessments.
Read Original

Russian hackers known as Sandworm have been accused of launching a cyberattack on Poland's power grid using data-wiping malware. This incident comes a decade after they disrupted the Ukrainian power grid, indicating a pattern of targeting critical infrastructure in Eastern Europe. The attack poses significant risks, not only to Poland's energy supply but also raises concerns about regional security and the potential for similar incidents in other countries. As tensions between Russia and NATO continue, this incident could escalate fears about cyber warfare and its impact on national security. Authorities are investigating the attack and assessing the full extent of its impact on the power grid operations.

Impact: Polish power grid systems
Remediation: N/A
Read Original

In December 2025, Poland experienced a significant cyber attack on its power grid, attributed to the Russia-linked hacking group Sandworm. Researchers from ESET analyzed the malware involved and determined that the attack was one of the largest targeting Poland's energy infrastructure. The involvement of Sandworm, known for its previous cyber operations, raises concerns about the security of critical national systems. This incident not only endangers the stability of Poland's energy supply but also highlights the ongoing risks posed by state-sponsored cyber threats in Europe. As nations increasingly rely on digital infrastructure, the implications for energy security and national defense become more pronounced.

Impact: Poland's power grid and energy system
Remediation: N/A
Read Original
Hackers Exploiting PDF24 App to Deploy Stealthy PDFSIDER Backdoor

Hackread – Cybersecurity News, Data Breaches, AI, and More

Actively Exploited

Researchers from Resecurity have uncovered a new malware called PDFSIDER that takes advantage of the legitimate PDF24 application to steal sensitive data and provide attackers with remote access to compromised systems. This malware is part of a sophisticated campaign targeting corporate networks, utilizing spear-phishing tactics to lure victims and encrypted communications to evade detection. Companies using PDF24 should be particularly vigilant as this attack leverages a trusted application, making it easier for attackers to bypass security measures. The implications are serious, as this could lead to significant data breaches and unauthorized access to sensitive corporate information.

Impact: PDF24 App, corporate networks
Remediation: Users should monitor for unusual activity in their networks, implement strong email filtering to block spear-phishing attempts, and ensure that all software, including PDF24, is kept up to date with the latest security patches.
Read Original

Cisco has addressed a serious flaw in its Secure Email products, which was exploited by a China-linked hacking group known as UAT-9686. The vulnerability, tracked as CVE-2025-20393, has a maximum severity score of 10.0 and affects the Secure Email Gateway and Email and Web Manager. Attackers were able to exploit this flaw as a zero-day, meaning it was actively used in attacks before a patch was made available. It's crucial for users of these products to apply the latest updates to protect their systems from potential exploitation. This incident highlights the ongoing risks posed by advanced persistent threat groups targeting widely used software.

Impact: Cisco Secure Email Gateway, Cisco Email and Web Manager
Remediation: Cisco has released patches for the affected Secure Email products. Users should ensure their systems are updated to the latest version to mitigate the vulnerability.
Read Original

A significant data breach has exposed the personal information of 17.5 million Instagram users. The breach is attributed to a North Korea-linked hacking group known as Kimsuky, which has been involved in various cyberattacks, including a new tactic called 'quishing.' This method combines phishing with QR codes, making it easier for attackers to deceive victims into revealing sensitive information. The scale of the breach raises concerns about user privacy and security, particularly for those whose data has been compromised. Users are urged to change their passwords and enable two-factor authentication to enhance their security.

Impact: Instagram users, specifically 17.5 million accounts
Remediation: Users should change their passwords and enable two-factor authentication.
Read Original
Page 1 of 3Next