Symantec cyber security experts spotted a ransomware campaign which exploits legitimate tools and both malware to earn big profits from large-multinational companies.
ESET cyber security experts: The threat actor, maybe North Korea’s Lazarus, exploited custom malware, fake jobs and social engineering via LinkedIn, to compromise the targets.
Atlas VPN cyber security experts: The first country of origin is Russia. The reasons is the lack of resources that ensure productivity. Phishing in 2019 has been the main threat to companies.
Sophos cyber security experts: It’s behind several waves of cyber attacks against industrial companies to drop RATs. All campaigns leveraged NSIS and several malware.
ClearSky cyber security experts: Iran-linked APTs hit dozens of companies and organizations around the world. They exploit vulnerabilities in systems with VPN-RDP services.
Cyber Security experts: cybercriminals threat to publish data stolen if the victims don’t pay the ransoms. It has just happened with Maze authors, who create a web site with private info.
It has been discovered by ImmuniWeb cyber security experts. The most popular sources of the exposed breaches were third parties (trusted included) and the companies themselves.
Link11 cyber security experts: The crooks claim to be the APT and blackmail organizations for a 2 Bitcoin ransom. But, they don’t bluff warning attacks of up to 60 Gbps.
Proofpoint cyber security experts: There threat actor, probably a state-sponsored APT, is distributing an updated version of the malware, a RAT. To date at least 17 firms were hit.