article thumbnail

Russian cybercriminal Aleksandr Brovko sentenced to 8 years in jail

Security Affairs

The scripts developed by the cyber criminal were used to parse log data collected from botnet and searched for personally identifiable information (PII) and account credentials. Brovko was involved in the illegal practice between 2007 and 2019. In some cases, the man manually chacked the stolen information.

article thumbnail

Russia-linked APT28 uses COVID-19 lures to deliver Zebrocy malware

Security Affairs

The APT28 group (aka Fancy Bear , Pawn Storm , Sofacy Group , Sednit , and STRONTIUM ) has been active since at least 2007 and it has targeted governments, militaries, and security organizations worldwide. The group was involved also in the string of attacks that targeted 2016 Presidential election.

Malware 121
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Russian spies are attempting to tap transatlantic undersea cables

Security Affairs

Data provided in the reports are disconcerting, British telecommunications firms supported GCHQ in collecting a large volume of internet data from undersea cables, the overall amount of information from 2007 to 2012 registered a 7,000-fold increase, meanwhile, the spying system monitored nearly 46 billion private communications “events” every day.

Wireless 145
article thumbnail

Russia-Linked Turla APT group Hijacked C2 of the Iranian OilRig

Security Affairs

Turla (aka Snake , Uroburos , Waterbug , Venomous Bear and KRYPTON ), has been active since at least 2007 targeting government organizations and private businesses. Recent campaigns demonstrate that Turla continues to evolve its arsenal and adopt news techniques to remain under the radar.

article thumbnail

Russia-linked Sofacy APT developed a new ‘Go’ variant of Zebrocy tool

Security Affairs

The Sofacy APT group has been active since at least 2007 and it has targeted governments, militaries, and security organizations worldwide. The Go variant of Zebrocy initially starts collecting info on the compromised system, then sends it to the command and control server. The malware connects to the C2 through HTTP POST requests.

Malware 111
article thumbnail

Too much UPnP-enabled connected devices still vulnerable to cyber attacks

Security Affairs

Data collected by the expert showed that 16 percent of those devices with UPnP enabled utilize the MiniUPnPd library, and only 0.39% is running the latest release 2.1. Most of the devices discovered by the expert still use old versions of UPnP libraries that are affected by years old flaws.

article thumbnail

Top VC Firms in Cybersecurity of 2022

eSecurity Planet

Company Sector Year Status Exabeam UEBA 2021 Private Cato Networks SASE 2020 Private Confluera Cloud XDR 2019 Private Aqua Container security 2017 Private Netskope SASE 2017 Private Zscaler Zero trust 2012 Nasdaq: ZS Sailpoint Identity management 2007 Private. New Enterprise Associates (NEA). YL Ventures. Honorable Mention Cybersecurity VCs.