A border-hopping PlugX USB worm takes its act on the road
Credit to Author: Gabor Szappanos| Date: Thu, 09 Mar 2023 11:00:02 +0000
Borne aloft by DLL sideloading, a far-flung infection touches ten time zones
Read moreCredit to Author: Gabor Szappanos| Date: Thu, 09 Mar 2023 11:00:02 +0000
Borne aloft by DLL sideloading, a far-flung infection touches ten time zones
Read moreCredit to Author: Jovi Umawing| Date: Tue, 03 May 2022 15:31:20 +0000
Chinese state-sponsored actors have been caught red-handed trying to extract intelligence from Russians via a guard camp close to their border.
The post State-backed hacking group from China is targeting the Russian military appeared first on Malwarebytes Labs.
Read moreCredit to Author: William Tsing| Date: Wed, 16 Jan 2019 17:00:00 +0000
While security companies are getting good at analyzing the tactics of nation-state threat actors, they still struggle with placing these actions in context and making solid risk assessments. So in this series, we’re going to take a look at a few APT groups, and see how they fit into the larger threat landscape—starting with APT10. Categories: Tags: advanced persistent threatadvanced persistent threatsaerospaceAPTAPT10APTschinaChinese Ministry of State SecurityconstructionengineeringFireEyeMSSPlugXPoison Ivyscanboxsogutelecomsthreat actors |
The post The Advanced Persistent Threat files: APT10 appeared first on Malwarebytes Labs.
Read more