ESET cyber security experts: There are also attacks on Ecuador, Colombia and Nicaragua. The malware operators use spear phishing campaigns with real old documents as a lure.
Positive Technologies cyber security experts: Government agencies targeted with a spear-phishing campaign. The messages had macro weaponized.
The cyber security experts: Targets are government and critical infrastructures, as oil and gas. But this happened before CYBERCOM strike. There are risks of back-and-forth cyber warfare.
Trend Micro cyber security experts: The Iranian state-sponsored APT is using new tools and payloads, which indicates that it’s continuously developing the schemes.
Yoroi-Cybaze cyber security experts noticed a suspicious attack on an organization with spear phishing email and a RMS used as a RAT. The target is not linked to Banking-Retail sectors.
FireEye: APT28 and Sandworm use spear phishing campaigns for cyber espionage. Brussels works with Big of cyber security and ENISA to counter meddling.
Check Point cyber security experts: There are gaps in management of inputs within the "unacev2.dll" library. Yoroi: If not necessary, block the ACE archives.
Yoroi-Cybaze cyber security experts: cybercrime and state-sponsored hackers use simple social engineering tricks to lure users to enable the malicious Macros.