APT28 Reemerges with Modern Espionage Arsenal, Code Tied to 2010s Operations
The modern Sednit arsenal is centered on two highly-developed implants, deployed systematically in tandem to ensure persistent access.
All topics
The modern Sednit arsenal is centered on two highly-developed implants, deployed systematically in tandem to ensure persistent access.
As we ease into the holidays, the security news doesn’t stop coming. This week we discuss the research from AWS threat intelligence on Russian adversaries targeting a variety of network edge devices for opportunistic exploitation, then we break down attacks by a Chinese threat actor that target a new zero day in Cisco’s AsyncOS, and finally we discuss the […]
Amazon researchers highlighted a "tactical pivot" by Russian GRU hackers who have been moving away from zero-day and N-day exploitation.
In a new report, ESET researchers have detailed several instances when the two groups’ tools have been found on the same compromised machines in Ukraine.
Microsoft has uncovered a long-running campaign by a threat group affiliated with Russian intelligence that has targeted diplomats working in Russia with a custom tool called ApolloShadow that enables the group to maintain persistence on victims’ devices as part of a cyberespionage operation. The group is known as Secret Blizzard and Microsoft’s researchers found that […]