Cyber Espionage

March 03, 2016 Security researchers laid out potential scenarios for the future of cyberespionage on Wednesday at the RSA Conference in San Francisco. Security researchers laid out potential scenarios for the future of cyberespionage on Wednesday at the RSA Conference in San Francisco. In a session titled “The Dark Web and Cyberespionage,” attendees were presented […]

by

March 30, 2016 A new backdoor trojan created to siphon information has been detected by Symantec researchers. A new information siphoning backdoor trojan that has so far only used in Taiwan has been detected by Symantec researchers. Backdoor.Dripion has been used only in a small number of targeted attacks, but based on previous iterations, Symantec suspects […]

by

March 29, 2016 Version numbers are hardcoded in Backdoor.Dripion, indicating that attackers can update their code. A new back door trojan, so far only used in Taiwan, created to siphon information has been detected by Symantec researchers. Backdoor.Dripion has been used only in a small number of targeted attacks, but based on previous iterations, Symantec […]

by

Symantec has issued the unsettling reminder that the code-signing certificates organizations use to secure their files and software might not be as safe as their IT teams think. Source: Symantec Unfortunately, hackers can take advantage of these code-signing certificates to attempt to steal sensitive corporate data. And as Symantec’s blog revealed, this is exactly what […]

by

Pakistan-Linked Hackers Successfully Conduct Third Cyber-Espionage Campaign Against Indian Military within a Month Operation C-Major is the name of the latest cyber-espionage campaign implemented by Pakistan-linked hackers. Trend Micro reports that the campaign targeted Indian military employees via a spear-phishing mechanism with which spyware was distributed to the victims. As per the security firm’s analysis, […]

by

The Indian military faces persistent cyber espionage challenges, especially from social media platforms. It’s time for a pro-active approach. By Sameer Patil* The recent media revelations of the Pakistan Army snooping on Indian army personnel’s phones and computers, reportedly through a malware called ‘SmeshApp,’ is the latest instance of the challenges faced by the Indian […]

by

The recent media revelations of the Pakistan Army snooping on Indian army personnel’s phones and computers, reportedly through a malware called SmeshApp, is the latest instance of the challenges faced by the Indian military in guarding sensitive and classified information such as the deployment and movement of troops and details of counter-terrorism operations like the […]

by

An increasing number of cyberespionage groups are using stolen code-signing certificates to make their hacking tools and malware look like legitimate applications. The latest example is a China-based hacker group that has launched targeted attacks against government and commercial organizations from around the world over the past two years. The group’s activities were uncovered by researchers […]

by