An operations security (OpSec) failure by the threat group “FIN7” led to an unintentional exposure of their new tools, campaigns, and underground affiliations. Security researchers conducted a cyber-security operation that granted them access to the threat group’s communication channels, and have published reports that offer unique insight into one of the world’s most notorious threat groups. FIN7 was seemingly developing new loader malware, called Tirion, to replace the previously used “Carbanak” backdoor. Tirion features many new capabilities for information gathering, lateral movement, reconnaissance, and code execution. Researchers also uncovered new data about BadUSB attacks that occurred in early 2020. The reports will probably not significantly affect FIN7’s operations, but it is realistically possible that they will modify some tactics, techniques, and procedures (TTPs) in response.
Three state-linked threat groups have reportedly conducted cyber attacks aimed at the US Democratic and Rep...
Most Recent Flipbooks
The well-established “Mozi” peer-to-peer (P2P) botnet has developed new persistence capabilities.
A configurable, malicious Traffic Direction System (TDS) has been enabling widespread malware attacks.
A years-long reconnaissance campaign against an employee of a US aerospace defense company was discovered and attributed to “TA456”, an Iranian state-backed advanced persistent threat (APT) group.
The new “BlackMatter”, “Haron”, and “El_Cometa” ransomware groups, which surfaced in the past three weeks, bear significant similarities to ransomware groups that disappeared last month
A vulnerability in Kaseya’s virtual system/server administrator (VSA) software has been exploited to deliver the “REvil” ransomware to multiple managed service providers.
The 14th Five Year Plan (FYP) adopted by the People’s Republic of China (PRC) in March 2021 has laid out key areas of focus for the country that are likely to prompt nation-state cyber espionage.
Several Clop members were arrested in association with money laundering, and the officials seized infrastructure the group has used in ransomware attacks globally.
The notorious Russia-based ransomware group “REvil” (aka Sodinokibi) has been blamed for the latest high-profile ransomware attack, on the world’s largest meat supplier.
The latest work of the notorious Russian state-associated “NOBELIUM” threat group is an email phishing campaign against multiple countries and sectors.