Remove Energy and Utilities Remove Phishing Remove Spyware
article thumbnail

PseudoManuscrypt: a mass-scale spyware attack campaign

SecureList

of all computers attacked by the PseudoManuscrypt malware are part of industrial control systems (ICS) used by organizations in various industries, including Engineering, Building Automation, Energy, Manufacturing, Construction, Utilities, and Water Management. According to our telemetry, at least 7.2%

Spyware 135
article thumbnail

Hackers Target Oil Producers During COVID-19 Slump

Security Affairs

Spear-phishing is a rapidly emerging threat. It’s more specific than generic phishing attempts and often targets a single person or company. Data from Barracuda cybersecurity researchers identified a 667% increase in spear-phishing attacks between the end of February and the following month.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Threats to ICS and industrial enterprises in 2022

SecureList

For instance, we see a new trend emerging in the criminal ecosystem of spyware-based authentication data theft, with each individual attack being directed at a very small number of targets (from single digits to several dozen). Phishing is the top initial penetration tool for targeted (and not-so-targeted) attacks.

Spyware 137
article thumbnail

Security Roundup September 2024

BH Consulting

For example, the Commission for the Regulation of Utilities (CRU) will become the ‘competent authority’ for the energy, drinking water and wastewater sectors. MORE Mythical beasts and where to find them: mapping the global spyware landscape MORE Six truths of quantifying cyber risk, as told by Google CISO Phil Venables.

article thumbnail

Advanced threat predictions for 2024

SecureList

APT targeting turns toward satellite technologies, producers and operators The only known case of an attack utilizing satellite technologies that happened in recent years was the KA-SAT network hack of 2022. This politician became the target of a previously undiscovered “zero-day” attack aimed at infecting his phone with spyware.

Hacking 141
article thumbnail

IT threat evolution Q3 2023

SecureList

DroxiDat, a lean variant of SystemBC that acts as a system profiler and simple SOCKS5-capable bot, was detected at an electric utility company. The C2 (command and control) infrastructure for the incident involved an energy-related domain, ‘powersupportplan[.]com’, com’, that resolved to an already suspicious IP host.

Malware 138
article thumbnail

Spam and phishing in 2022

SecureList

Short-lived phishing sites often offered to see the premieres before the eagerly awaited movie or television show was scheduled to hit the screen. At the beginning of that year, we still observed phishing attacks that used the themes of infection and prevention as the bait.

Phishing 117