The request stems from the attack by al-Sadr supporters on the Swedish embassy. Meanwhile, the international community is reinforcing security measures on its own.
Kaspersky cybersecurity experts: Victims navigate to a URL pointing to a ZIP archive with 2 files: a decoy document and a malicious LNK that leads to malware infection.
Cybersecurity experts: The malware core infrastructure was originally located in Ukraine. After the Russian invasion, it has moved “at home” or in Belarus.
Pro-Russian hackers close to the GRU attack institutions, carriers and suppliers with DDoS. The operation is complementary to the Moscow military one: the objectives are shared.
Op.Neutrino compromised an operational AI/ML model, in addition to a power grid SCADA/ICS, belonging to the DK Port substation. It’s the new response for the attacks in Ukraine.
CERT-UA cybersecurity experts: Z-Team exploits Avidar, Netscan and a Cobalt Strike beacon, then it exfiltrate data from corporate networks and encrypt it.