med-mastodon.com is one of the many independent Mastodon servers you can use to participate in the fediverse.
Medical community on Mastodon

Administered by:

Server stats:

363
active users

#apt28

0 posts0 participants0 posts today

Russian hackers breach orgs to track aid routes to Ukraine

A Russian state-sponsored cyberespionage campaign attributed to APT28 hackers has been targeting and compromising international organizations since 2022 to disrupt aid efforts to Ukraine.

The hackers targeted entities in the defense, transportation, IT services, air traffic, and maritime sectors in 12 European countries and the United States.

#APT28 #russia #Ukraine #security #cybersecurity #hackers #hacking

bleepingcomputer.com/news/secu

France accuses Russian intelligence of repeated cyber attacks since 2021

France's foreign ministry explicitly accused Russia's GRU military intelligence agency on Tuesday of mounting cyber attacks on a dozen entities including ministries, defense firms and think tanks since 2021 in an attempt to destabilize France.

#France #russia #cyberattack #gru #apt28 #security #cybersecurity #hackers #Hacking #hacked

reuters.com/world/europe/first

Better late than never: The government of #France attributes a wide range of #cyberattacks dating back ten years, targeting the French-hosted 2024 Olympics, prior elections, and against entities like television networks, to Russia's GRU (#APT28), and condemns them, officially, in a statement posted to their website.

A machine-translated-to-English screenshot of the statement is shown below.

"Together with its partners, France is determined to use all the means at its disposal to anticipate, deter and respond to Russia’s malicious behaviour in cyberspace where appropriate."

Someone has to.

diplomatie.gouv.fr/fr/dossiers

Cyber Espionage Operation Expanding from Central Asia

An active cyber-espionage campaign by UAC-0063 is targeting organizations in Central Asia and Europe, including government entities and diplomatic missions. The group exploits previously compromised victims by weaponizing exfiltrated documents to deliver HATVIBE malware. They use sophisticated tools like DownExPyer, PyPlunderPlug, and LOGPIE for data exfiltration and keylogging. The campaign has expanded beyond Central Asia to European countries such as Germany, the UK, Netherlands, Romania, and Georgia. The group's tactics include initial access through weaponized documents, persistent access via scheduled tasks, and various data collection methods. While there are similarities with APT28, definitive attribution remains uncertain. The ongoing operations and infrastructure maintenance indicate an active and evolving threat.

Pulse ID: 679a27c8959aaeb76da166ed
Pulse Link: otx.alienvault.com/pulse/679a2
Pulse Author: AlienVault
Created: 2025-01-29 13:06:16

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

LevelBlue Open Threat ExchangeLevelBlue - Open Threat ExchangeLearn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.

"For determined hackers, sitting in a car outside a target's building and using radio equipment to breach its Wi-Fi network has long been an effective but risky technique. These risks became all too clear when spies working for Russia's GRU military intelligence agency were caught red-handed on a city street in the Netherlands in 2018 using an antenna hidden in their car's trunk to try to hack into the Wi-Fi of the Organization for the Prohibition of Chemical Weapons.

Since that incident, however, that same unit of Russian military hackers appears to have developed a new and far safer Wi-Fi hacking technique: Instead of venturing into radio range of their target, they found another vulnerable network in a building across the street, remotely hacked into a laptop in that neighboring building, and used that computer's antenna to break into the Wi-Fi network of their intended victim—a radio-hacking trick that never even required leaving Russian soil.

At the Cyberwarcon security conference in Arlington, Virginia, today, cybersecurity researcher Steven Adair will reveal how his firm, Volexity, discovered that unprecedented Wi-Fi hacking technique—what the firm is calling a “nearest neighbor attack"—while investigating a network breach targeting a customer in Washington, DC, in 2022. Volexity, which declined to name its DC customer, has since tied the breach to the Russian hacker group known as Fancy Bear, APT28, or Unit 26165."

wired.com/story/russia-gru-apt

WIRED · Russian Spies Jumped From One Network to Another Via Wi-Fi in an Unprecedented HackBy Andy Greenberg

#Russian #Spies Jumped From One Network to Another Via Wi-Fi in an Unprecedented #Hack

In a first, Russia's #APT28 hacking group appears to have remotely breached the Wi-Fi of an #espionage target by hijacking a laptop in another building across the street.
#security #privacy #russia

wired.com/story/russia-gru-apt

WIRED · Russian Spies Jumped From One Network to Another Via Wi-Fi in an Unprecedented HackBy Andy Greenberg