Yoroi-Cybaze cyber security experts: After APT28, also Gamaredon is spying Kiev. The lure is a legit military document, weaponized with Pteranodon malware.
The US cyber security experts: It’s a new Trojan with 9 files infected. Seven of them are "proxy applications that mask traffic between malware and the remote operators.
The cyber security expert: It’s easy, thanks to rules to identify specific set of binaries. But it also needs manual analysis to confirm if the threat is real o fake.
Threat actors try to meddle the votes, starting from the one for the European Parliament, by cyber means. Here’s how to counter attacks, data leaks and fake news.
VpnMentor cyber security experts: Third parties could launch targeted cyber attacks and espionage, endangering people's economical and physical security.
Cyber security researcher nicknamed The Sphinx programmed is own version, to understand how it works. Its main elements are: Stealthy, Powerful and Extensible.
Yoroi-Cybaze cyber security experts: The threat actor realized a complex implant leveraging an ecosystem of libraries to conduct his cyber warfare operation.
The Asan Institute for Policy Studies: Pyongyang is concentrating its cyber warfare on hacking financial institutions to reduce the impact of international sanctions.