Cyber Espionage

March 29, 2016 Version numbers are hardcoded in Backdoor.Dripion, indicating that attackers can update their code. A new back door trojan, so far only used in Taiwan, created to siphon information has been detected by Symantec researchers. Backdoor.Dripion has been used only in a small number of targeted attacks, but based on previous iterations, Symantec […]

by

Symantec has issued the unsettling reminder that the code-signing certificates organizations use to secure their files and software might not be as safe as their IT teams think. Source: Symantec Unfortunately, hackers can take advantage of these code-signing certificates to attempt to steal sensitive corporate data. And as Symantec’s blog revealed, this is exactly what […]

by

Pakistan-Linked Hackers Successfully Conduct Third Cyber-Espionage Campaign Against Indian Military within a Month Operation C-Major is the name of the latest cyber-espionage campaign implemented by Pakistan-linked hackers. Trend Micro reports that the campaign targeted Indian military employees via a spear-phishing mechanism with which spyware was distributed to the victims. As per the security firm’s analysis, […]

by

The Indian military faces persistent cyber espionage challenges, especially from social media platforms. It’s time for a pro-active approach. By Sameer Patil* The recent media revelations of the Pakistan Army snooping on Indian army personnel’s phones and computers, reportedly through a malware called ‘SmeshApp,’ is the latest instance of the challenges faced by the Indian […]

by

The recent media revelations of the Pakistan Army snooping on Indian army personnel’s phones and computers, reportedly through a malware called SmeshApp, is the latest instance of the challenges faced by the Indian military in guarding sensitive and classified information such as the deployment and movement of troops and details of counter-terrorism operations like the […]

by

An increasing number of cyberespionage groups are using stolen code-signing certificates to make their hacking tools and malware look like legitimate applications. The latest example is a China-based hacker group that has launched targeted attacks against government and commercial organizations from around the world over the past two years. The group’s activities were uncovered by researchers […]

by