Kaspersky cyber security experts: The cyber espionage APT postpones the execution of PowerShower until a later stage to make the malware invisible.
Microsoft cyber security experts: The Russian group aka Fancy Bear, Pawn Storm, Sofacy Group, STRONTIUM, and Sednit) tried to compromise devices to gain initial access.
F-Secure cyber security experts: The target is the banking/finance sector. The motivations are three: data theft, data integrity and sabotage, and direct financial theft.
FireEye cyber security experts: Malicious hackers masqueraded as a member of Cambridge University, used LinkedIn to deliver malicious documents and three new malware families.
Trend Micro cyber security experts: The first malicious code abuses user account control (UAC) bypass and works as a loader for other threats. The second is a dangerous backdoor.
The malware chain of infection starts with a weaponized email in Korean. The cyber security experts: It’s seems the work of TA505 APT, focused on financial institutions-retail companies.
The Agency suffered a hug data breach with approximately 500 MB of data related to Mars missions stolen. The cyber security experts: It’s the work of an APT.
Trend Micro cyber security experts: The Iranian state-sponsored APT is using new tools and payloads, which indicates that it’s continuously developing the schemes.
The cyber security expert, Marco Ramilli, analyzed it to match the clues e find if Iranian state-sponsored hackers are behind the operation. Something says Yes, something diverge.
Cybaze-Yoroi ZLAB cyber security experts: The campaign shows the Matryoshka structure to chain SFX archives, typical of APT implant, and the use of a legit third party RAT as payload.