SafeUM
Home Blog Services Download Help About Recharge

Axarhöfði 14, 110 Reykjavik, Iceland

Iceland - 2015
SafeUM
Blog
Services
Download
Help
About
Recharge
Menu
Archive
# APT
2 Nov 2017

Silence: A new financial APT campaign

Experts have discovered a new targeted attack using a Trojan by the name of Silence against financial institutions. Russian banks are first in the line of fire, but Malaysian and Armenian organizations have also been infected.

Tactically, the attack is very similar to the canonical financial APT campaign, the notorious Carbanak: a phishing e-mail with a malicious attachment sent to employees of banks and financial organizations, followed by spying on employees and then, suddenly, a fraudulent transaction. This proven method has already brought its operators billions of dollars, so why not try it again? 

Read more
Tags:
information leaks APT fraud
Source:
Kaspersky Daily
1725
5 Apr 2017

Lazarus APT spinoff linked to banking hacks

The Lazarus Group, a nation-state level of attacker tied to the 2014 attacks on Sony Pictures Entertainment, has splintered off a portion of its operation to concentrate on stealing money to fund itself.

The group, widely believed to be North Korean, has been linked to a February 2016 attack against the Bangladesh Central bank that resulted in more than $850 million in fraudulent SWIFT network transactions, $80 million of which still has not been recovered. Researchers explained how the splinter group, known as Bluenoroff, has almost exclusively hit financial institutions, casinos, financial trade software development companies and cryptocurrency businesses.

Read more
Tags:
hackers APT
Source:
Threatpost
1819
6 Apr 2016

FBI says a hacking group has had access to US government files for years

The feds warned that “a group of malicious cyber actors,” whom security experts believe to be the government-sponsored hacking group known as APT6, “have compromised and stolen sensitive information from various government and commercial networks” since at least 2011, according to an FBI alert.

The alert shows that foreign government hackers are still successfully hacking and stealing data from US government’s servers, their activities going unnoticed for years. This comes months after the US government revealed that a group of hackers had for more than a year infiltrated the computer systems of the Office of Personnel Management. 

Read more
Tags:
FBI hackers USA APT
Source:
Motherboard
1850
14 Sep 2015

Russian-speaking cyber spies exploit satellites

Turla APT group is one the most advanced threat actors in the world. This cyber espionage group has been active for more than 8 years, but little was known about its operations until last year.

Specifically, this research included examples of language artifacts, showing that part of the Turla are Russian-speakers. What makes the Turla group especially dangerous and difficult to catch is not just the complexity of its tools, but the exquisite satellite-based command-and-control mechanism implemented in the final stages of the attack. Command-and-control servers are the base of advanced cyber-attacks. 

Read more
Tags:
hackers Russia APT surveillance
Source:
Kaspersky Daily
2288
26 May 2015

Maritime industry is easy meat for cyber criminals

Merchant vessels are continuously becoming bigger and getting more electronic systems. Seafarers often depend on technology data more than their own skills, knowledge, and senses.

Crews are becoming smaller as computer systems are being used for navigation, as well as for rapid unloading and tracking of goods at ports. These systems are vulnerable to cyber threats. Victims often try to keep successful hacks a secret. The reason for this is that the maritime companies value their reputation more than the money they actually lose. Also, cyber criminals are stealthy and in many cases companies are unaware they have been hacked. 

Read more
Tags:
hackers information leaks APT
Source:
Kaspersky Daily
Author:
Kate Kochetkova
2456
7 Apr 2015

How security pros deal with cybercriminals

1 in 3 security professionals recommend negotiating with cybercriminals for the return of stolen data or the restoration of encrypted files. The study also found that firsthand experience with cybercrime extortion clearly shaped opinions. 

Whether data is stolen by APTs or targeted attacks, or lost due to ransomware infection, enterprises need to reevaluate their cybersecurity strategies to incorporate the latest advanced threat defenses and become obsessive about backing up their data. Security professionals within the healthcare and financial services sectors were least likely to recommend negotiating with cyber-extortionists.

Read more
Tags:
hackers APT
Source:
Help Net Security
2026
24 Feb 2015

New APT groups are emerging in the Middle East

Security researchers have uncovered the first ever Arabic language advanced persistent threat group. Dubbed Desert Falcons, the group of thirty or so attackers, operates out of Palestine, Egypt and Turkey and is said to have developed and deployed their wares exclusively in the Middle East.

It is impossible to determine whether Desert Falcons is state sponsored, but internet security is under threat. Their arsenal consists of homemade malware tools, social engineering and other techniques designed to execute and conceal campaigns on traditional and mobile operating systems. Desert Falcons’ malware is intended to steal sensitive information.

Read more
Tags:
surveillance APT
Source:
Kaspersky Daily
2967
9 Dec 2014

Linux trojan may have infected victims for years

Researchers have uncovered an extremely stealthy trojan for Linux systems that attackers have been using to siphon sensitive data from governments and pharmaceutical companies around the world.

The previously undiscovered malware represents a missing puzzle piece tied to Turla, a so-called advanced persistent threat disclosed in August. For at least four years, the campaign targeted government institutions, embassies, military, education, research, and pharmaceutical companies in more than 45 countries. The unknown attackers have infected several hundred Windows-based computers by exploiting a variety of vulnerabilities. 

Read more
Tags:
Linux Trojan APT Turla Windows information leaks
Source:
Ars Technica
2059
9 Dec 2014

False perceptions of IT security

This article is the first in a series of posts in which I will document some of the false perceptions in IT security. And believe me, there are many. While it is nearly impossible to cover them all, I will certainly attempt to explain as many as my time and energy allows.

When we talk about IT security, we still tend to live with the mindset that our biggest issue is protecting ourselves against future threats. The same thing happens when I attend security conferences or read articles and blog posts; everyone seems to focus on trying to uncover or protect us from the unknown. Almost every security company and a number of researchers are talking about targeted attacks. 

Read more
Tags:
data protection APT
Source:
Kaspersky Daily
Author:
David Jacoby
1990
24 Nov 2014

Breaking the code on Russian malware

Russia poses a serious cyber threat to industrial control systems, pharmaceutical, defense, aviation, and petroleum companies. Russian government cyber operations aim to use malware to steal information on files, persist on ICS equipment, and commit espionage. 

There is nothing quick about studying Russian cyber operations. Beyond understanding the complexities of the malware itself, one must also match up the names of several families of malware, some which have evolved over time and have had different names, as well as to link together the names given to specific groups by a number of private security companies. 

Read more
Tags:
Russia hackers APT28 Energetic Bear Uroburous
Source:
Recorded Future
2168
SafeUM NEWS
27 Apr 2017 safeum news imgage Encrypted Group Chat
4 Apr 2017 safeum news imgage Each SafeUM user gets free anonymous phone number
10 Mar 2017 safeum news imgage SafeUM useful features to help you feel safe
28 Sep 2016 safeum news imgage Secure Messenger SafeUM
21 Jul 2015 safeum news imgage New secured zone of Google Play: secure messenger SafeUM for Android. Download, Install, Communicate
3 Apr 2015 safeum news imgage We are beginning to test SafeUM for Windows Phone
25 Feb 2015 safeum news imgage SafeUM messenger is available for public testing
20 Feb 2015 safeum news imgage Algorithms and encryption schemes used for secure messenger SafeUM
30 Jan 2015 safeum news imgage New "TOP Security!" app is on the App Store
22 Jan 2015 safeum news imgage Free "TOP Security!" app is available on Google Play
28 Oct 2014 safeum news imgage How are security keys generated in SafeUM?
19 Jun 2014 safeum news imgage SafeUM is the best messenger for data protection and information security
16 Jun 2014 safeum news imgage Become a SafeUM tester and get free PREMIUM subscription for a year
12 May 2014 safeum news imgage Why Premium secure messenger SafeUM cannot be free
25 Apr 2014 safeum news imgage Encrypted secure messaging for every mobile device
All news
First page Previous
1 2
Next Last page
SafeUM
Confidential Terms of Use Our technologies Company
Follow us
Download
SafeUM © Safe Universal Messenger

Axarhöfði 14,
110 Reykjavik, Iceland

Iceland - 2015