Cybersecurity researchers concerned about a possible shift of pro-Moscow APTs, following international sanctions. From espionage they would move on to "making cash".
The boost of attacks-data breaches confirm that the phenomenon is growing and the crisis in Ukraine will worsen it. Will we move from cyber espionage to desruptions?
Cybereason Nocturnus cybersecurity Team: The Iran’s linked malicious code, a backdoor, features encrypted C2 channels and supports downloading additional payloads.
Threat actors could target the Games in China and participants with DDoS, malware, social engineering, data theft or leaks, phishing, disinformation campaigns, or insider threats.
Malwarebytes cybersecurity experts found 2 decoy documents in the North Korea APT’s campaign Lockheed Martin campaign, that use macro to spread malicious code.
Cyber threats and geopolitical events are increasingly connected. Countries that can’t attack kinetically use cyber weapons to hit their enemies and increase pressure.
Symantec cybersecurity experts: The MuddyWater APT (MERCURY, SeedWorm and TEMP.Zagros) used legitimate tools, publicly available malware, and living-off-the-land tactics.