The Ransomware-as-a-Service (RaaS) and affiliate program deploy MountLocker widely across corporate networks, seeking multimillion-dollar payments for decryption services.
The operators behind Operation StealthyTrident have launched supply-chain attacks against hundreds of Mongolian government agencies by exploiting a legitimate software called Able Desktop.
The campaign has targeted consulting, technology, telecom, and other entities such as multiple federal government agencies, including the US Treasury and Commerce departments.
The hack began as early as March when malicious code was snuck into updates to the popular SolarWinds Orion software that monitors computer networks of businesses and governments.
Among all the ways COVID-19 has affected the cybersecurity world, perhaps nothing is more impossible than live hacking events, which were once a staple of the security industry.
Critical and classified data of a Noida-based private company, providing technology solutions to Indian defense forces, has been allegedly hacked, leading to the theft of confidential information.
The findings were published today in a paper titled “AIR-FI: Generating Covert Wi-Fi Signals from Air-Gapped Computers” by Dr. Mordechai Guri, the head of R&D at BGU’s Cyber-Security Research Center.
The Russia-linked UNC2452 threat actor group has been observed leveraging a supply chain compromise to serve backdoored updates for the SolarWinds Orion Platform software.
The adversaries leverage administrative privileges obtained during the on-premise compromise to access the victim’s global administrator account and/or trusted SAML token-signing certificate.
The DHS, the State Department, and the NIH joined the list of known victims of a months-long, highly sophisticated digital spying operation by Russia whose damage remains uncertain but is presumed to be extensive, experts say.