Remove 2011 Remove Information Security Remove Internet
article thumbnail

New Leak Shows Business Side of China’s APT Menace

Krebs on Security

Security experts who reviewed the leaked data say they believe the information is legitimate, and that i-SOON works closely with China’s Ministry of State Security and the military. In 2021, the Sichuan provincial government named i-SOON as one of “the top 30 information security companies.”

article thumbnail

U.S. agency cautions employees to limit phone use due to Salt Typhoon hack of telco providers

Security Affairs

government agency created in 2011 to protect consumers in the financial sector, ensuring fair, transparent, and competitive financial markets The agency has issued a directive to employees to reduce the use of their phones and invite them to use Microsoft Teams and Cisco WebEx for their meetings and conversations that involve nonpublic data.

Hacking 136
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Iranian Charming Kitten APT targets various entities in Brazil, Israel, and the U.A.E. using a new backdoor

Security Affairs

Microsoft has been tracking the threat actors at least since 2013, but experts believe that the cyberespionage group has been active since at least 2011 targeting journalists and activists in the Middle East, as well as organizations in the United States, and entities in the U.K., Israel, Iraq, and Saudi Arabia. ” concludes the post.

Internet 137
article thumbnail

Google disrupts the Glupteba botnet

Security Affairs

The blockchain-enabled botnet has been active since at least 2011, researchers estimate that the Glupteba botnet is currently composed of more than 1 million Windows PCs around the world. Google partnered with Internet infrastructure providers and hosting providers, such as CloudFlare, to take down servers used by the gang.

Backups 136
article thumbnail

KashmirBlack, a new botnet in the threat landscape that rapidly grows

Security Affairs

KashmirBlack scans the internet for sites using vulnerable CMS versions and attempting to exploit known vulnerabilities to them and take over the underlying server. Experts observed a continuous growth of the botnet since its discovery along with an increasing level of complexity.

article thumbnail

Silent Night Zeus botnet available for sale in underground forums

Security Affairs

The source code of the Zeus Trojan is available in the cybercrime underground since 2011 allowing crooks to develop their own release since. Experts found multiple variants in the wild, many of them belonging to the Terdot Zbot/Zloader malware family. Experts believe that Axe is the developer of the Axe Bot 1.4.1, comparing Axe Bot 1.4.1

Banking 145
article thumbnail

SHARED INTEL: How ransomware evolved from consumer trickery to deep enterprise hacks

The Last Watchdog

The above-mentioned AIDS Trojan hailing from the distant pre-Internet era was the progenitor of the trend, but its real-world impact was close to zero. David Balaban is a computer security researcher with over 17 years of experience in malware analysis and antivirus software evaluation.