Kaspersky cyber security experts: The ransomware uses exploits to escalate privileges and targets the Asia-Pacific region. Is the malware the heir of GandCrab?
Yoroi-Cybaze ZLab cyber security experts: The malware works as an encryptor and a decryptor. It abuses Clearnet-to-Tor proxy services to connect to its C2, hidden behind onion sites.
Trend Micro cyber security experts: It’s concealed in 182 free-to-download game and camera apps, majority of which on Google Play Store, and collectively had millions of downloads.
The cyber security experts are investigating current malware campaigns targeting organisations globally, including in the UK. In some cases, identified also Emotet and Trickbot infections.
Cyber security expert and Yoroi founder, Marco Ramilli, analyzed the two state-sponsored groups to look for strong and weak similarities.
The cyber security expert Larry Cashdollar: It has already hit over 2,000 devices. The author, the 14-year-old Light Leafon, now want to expand it adding more functions and exploits.
The malware chain of infection starts with a weaponized email in Korean. The cyber security experts: It’s seems the work of TA505 APT, focused on financial institutions-retail companies.
The Agency suffered a hug data breach with approximately 500 MB of data related to Mars missions stolen. The cyber security experts: It’s the work of an APT.
The cyber security experts: Targets are government and critical infrastructures, as oil and gas. But this happened before CYBERCOM strike. There are risks of back-and-forth cyber warfare.
Symantec cyber security experts: The group, aka Turla, launched 3 campaigns: one with Neptun malware, another with Meterpreter and the last one with custom RPC backdoor.