Fancy Bear APT Uses New Cannon Trojan to Target Government Entities

Fancy Bear APT Uses New Cannon Trojan to Target Government Entities

The spear phishing attack campaign uses email as C2 channel

Sofacy APT Develops New Flash Player Exploit Platform Called DealersChoice

Sofacy APT Develops New Flash Player Exploit Platform Called DealersChoice

Targets included a Ukrainian defense contractor

Cyber-Espionage Group Targets US Government with New Malware Persistence Trick

Cyber-Espionage Group Targets US Government with New Malware Persistence Trick

Group behind the attack is named Sofacy (APT28, Fancy Bear)

Sofacy Cyber-Espionage Group Resurfaces with New Backdoors and Zero-Days

Sofacy Cyber-Espionage Group Resurfaces with New Backdoors and Zero-Days

Russian-linked hacking group created new hacking tools

  • Security
  • By Catalin Cimpanu
  • November 19th, 2015
Microsoft's Security Intelligence Report Highlights the Highly Effective Strontium APT

Microsoft's Security Intelligence Report Highlights the Highly Effective Strontium APT

Microsoft takes notice of Russia's most effective APT

Russian Hackers Caught Preparing Large Attack Against Financial Institutions

Russian Hackers Caught Preparing Large Attack Against Financial Institutions

Pawn Storm group started preparations in June 2014

iOS Devices Targeted by Cyber-Espionage Campaign

iOS Devices Targeted by Cyber-Espionage Campaign

Two spyware samples have been linked to Sednit malware

Air-Gapped Systems Targeted by Sednit Espionage Group

Air-Gapped Systems Targeted by Sednit Espionage Group

The group is believed to operate since 2005

Sednit Malware Used in Operation Pawn Storm Espionage Campaign

Sednit Malware Used in Operation Pawn Storm Espionage Campaign

Very specific victims targeted through spear phishing

Cyber Espionage Group Uses Bank Website to Redirect to Exploit Kit

Cyber Espionage Group Uses Bank Website to Redirect to Exploit Kit

Group targets individuals in the military defense industry