Microsoft Defender ATP cyber security experts: Telemetry showed a sudden increase in the use of WMIC tool to run a script. This led researchers discovery the cyber attack.
Trend Micro cyber security experts: The first malicious code abuses user account control (UAC) bypass and works as a loader for other threats. The second is a dangerous backdoor.
The Agency suffered a hug data breach with approximately 500 MB of data related to Mars missions stolen. The cyber security experts: It’s the work of an APT.
Symantec cyber security experts: The group, aka Turla, launched 3 campaigns: one with Neptun malware, another with Meterpreter and the last one with custom RPC backdoor.
Trend Micro cyber security expert: So far observed more than 660 Android devices infected with GolfSpy malware. Much of the information being stolen appear to be military-related.
Trend Micro cyber security experts: The Iranian state-sponsored APT is using new tools and payloads, which indicates that it’s continuously developing the schemes.
The cyber security expert, Marco Ramilli, analyzed it to match the clues e find if Iranian state-sponsored hackers are behind the operation. Something says Yes, something diverge.
Cybaze-Yoroi ZLAB cyber security experts: The campaign shows the Matryoshka structure to chain SFX archives, typical of APT implant, and the use of a legit third party RAT as payload.