#Russia-linked #APT28 use #Signal chats to target Ukraine official with #malware
https://securityaffairs.com/179288/apt/russia-linked-apt28-use-signal-chats-to-target-ukraine-official-with-malware.html
#securityaffairs #hacking

#Russia-linked #APT28 use #Signal chats to target Ukraine official with #malware
https://securityaffairs.com/179288/apt/russia-linked-apt28-use-signal-chats-to-target-ukraine-official-with-malware.html
#securityaffairs #hacking
Russian hackers breach orgs to track aid routes to Ukraine
A Russian state-sponsored cyberespionage campaign attributed to APT28 hackers has been targeting and compromising international organizations since 2022 to disrupt aid efforts to Ukraine.
The hackers targeted entities in the defense, transportation, IT services, air traffic, and maritime sectors in 12 European countries and the United States.
#APT28 #russia #Ukraine #security #cybersecurity #hackers #hacking
#Russia-linked #APT28 targets western logistics entities and technology firms
https://securityaffairs.com/178165/apt/russia-linked-apt28-targets-western-logistics-entities-and-technology-firms.html
#securityaffairs #hacking
Another day, another Russia-linked malware spotted targeting Ukranian organisations, as per ESET. This time, the attack is dubbed as #RoundPress.
Read: https://hackread.com/russia-spypress-malware-exploits-webmails-spy-ukraine/
France accuses Russian intelligence of repeated cyber attacks since 2021
France's foreign ministry explicitly accused Russia's GRU military intelligence agency on Tuesday of mounting cyber attacks on a dozen entities including ministries, defense firms and think tanks since 2021 in an attempt to destabilize France.
#France #russia #cyberattack #gru #apt28 #security #cybersecurity #hackers #Hacking #hacked
From TV5Monde to Govt: France Blames Russia’s APT28 for Cyberattacks – Source:hackread.com https://ciso2ciso.com/from-tv5monde-to-govt-france-blames-russias-apt28-for-cyberattacks-sourcehackread-com/ #1CyberSecurityNewsPost #CyberSecurityNews #ForestBlizzard #cybersecurity #CyberAttacks #CyberAttack #BlueDelta #FancyBear #Hackread #security #TV5Monde #France #Sednit #Sofacy #APT28
#France links Russian #APT28 to attacks on dozen French entities
https://securityaffairs.com/177238/apt/france-links-russian-apt28-to-attacks-on-dozen-french-entities.html
#securityaffairs #hacking #Russia
Better late than never: The government of #France attributes a wide range of #cyberattacks dating back ten years, targeting the French-hosted 2024 Olympics, prior elections, and against entities like television networks, to Russia's GRU (#APT28), and condemns them, officially, in a statement posted to their website.
A machine-translated-to-English screenshot of the statement is shown below.
"Together with its partners, France is determined to use all the means at its disposal to anticipate, deter and respond to Russia’s malicious behaviour in cyberspace where appropriate."
Someone has to.
Cyber Espionage Operation Expanding from Central Asia
An active cyber-espionage campaign by UAC-0063 is targeting organizations in Central Asia and Europe, including government entities and diplomatic missions. The group exploits previously compromised victims by weaponizing exfiltrated documents to deliver HATVIBE malware. They use sophisticated tools like DownExPyer, PyPlunderPlug, and LOGPIE for data exfiltration and keylogging. The campaign has expanded beyond Central Asia to European countries such as Germany, the UK, Netherlands, Romania, and Georgia. The group's tactics include initial access through weaponized documents, persistent access via scheduled tasks, and various data collection methods. While there are similarities with APT28, definitive attribution remains uncertain. The ongoing operations and infrastructure maintenance indicate an active and evolving threat.
Pulse ID: 679a27c8959aaeb76da166ed
Pulse Link: https://otx.alienvault.com/pulse/679a27c8959aaeb76da166ed
Pulse Author: AlienVault
Created: 2025-01-29 13:06:16
Be advised, this data is unverified and should be considered preliminary. Always do further verification.
Interesting attack vector
"Russian Spies Jumped From One Network to Another Via Wi-Fi in an Unprecedented Hack"
https://www.wired.com/story/russia-gru-apt28-wifi-daisy-chain-breach/
Nearest Neighbor Attack: Angriff über WLAN des Nachbarn | Security https://www.heise.de/news/US-Firma-ueber-benachbarte-WLAN-Geraete-Dritter-angegriffen-10129358.html #CyberCrime #APT28 #FancyBear #ForestBlizzard #Sofacy #GruesomeLarch
"For determined hackers, sitting in a car outside a target's building and using radio equipment to breach its Wi-Fi network has long been an effective but risky technique. These risks became all too clear when spies working for Russia's GRU military intelligence agency were caught red-handed on a city street in the Netherlands in 2018 using an antenna hidden in their car's trunk to try to hack into the Wi-Fi of the Organization for the Prohibition of Chemical Weapons.
Since that incident, however, that same unit of Russian military hackers appears to have developed a new and far safer Wi-Fi hacking technique: Instead of venturing into radio range of their target, they found another vulnerable network in a building across the street, remotely hacked into a laptop in that neighboring building, and used that computer's antenna to break into the Wi-Fi network of their intended victim—a radio-hacking trick that never even required leaving Russian soil.
At the Cyberwarcon security conference in Arlington, Virginia, today, cybersecurity researcher Steven Adair will reveal how his firm, Volexity, discovered that unprecedented Wi-Fi hacking technique—what the firm is calling a “nearest neighbor attack"—while investigating a network breach targeting a customer in Washington, DC, in 2022. Volexity, which declined to name its DC customer, has since tied the breach to the Russian hacker group known as Fancy Bear, APT28, or Unit 26165."
https://www.wired.com/story/russia-gru-apt28-wifi-daisy-chain-breach/
#Russian #Spies Jumped From One Network to Another Via Wi-Fi in an Unprecedented #Hack
In a first, Russia's #APT28 hacking group appears to have remotely breached the Wi-Fi of an #espionage target by hijacking a laptop in another building across the street.
#security #privacy #russia
https://www.wired.com/story/russia-gru-apt28-wifi-daisy-chain-breach/
"APT28: Following bear tracks back to the cave" presented by Golo Mühr
Is Russian group #APT28 behind the cyber attack on the #German #air #traffic control agency (#DFS)?
https://securityaffairs.com/168070/apt/apt28-cyber-attack-german-air-traffic-control-agency-dfs.html
#securityaffairs #hacking
#APT28 targets key networks in #Europe with #HeadLace #malware
https://securityaffairs.com/164061/apt/apt28-headlace-malware-europe.html
#securityaffairs #hacking
Cyber Alert: APT28, the Russian GRU-backed threat actor, has been linked to sophisticated campaigns targeting European networks with HeadLace malware and credential-harvesting web pages.
Read: https://thehackernews.com/2024/05/russian-hackers-target-europe-with.html