Skip to content

Cyber Security And Bitcoin Blockchain News

The World

  • DOT, ADA, SHIB Down Under 10%, as WAVES Rallies on Monday – Market Updates Bitcoin News bitcoin news
  • Onchain Analysis Report Says Terra’s Bitcoin Reserves Were Sent to Binance and Gemini – Bitcoin News bitcoin news
  • Researchers Disclose 10-Year-Old Vulnerabilities in Avast and AVG Antivirus cyber security news
  • Chinese Hackers Caught Exploiting Popular Antivirus Products to Target Telecom Sector cyber security news
  • BTC Falls to 2-Month Low Following the Latest NFP Report   – Market Updates Bitcoin News bitcoin news
  • ‘Dr. Doom’ Nouriel Roubini to Launch Tokenized Dollar Replacement — With Payment and ESG Features – Bitcoin News bitcoin news
  • Thousands of WordPress Sites Hacked to Redirect Visitors to Scam Sites cyber security news
  • Bitcoin Hashrate Soars To New All-Time High, Will Price Follow bitcoin news

New Hacker Group Pursuing Corporate Employees Focused on Mergers and Acquisitions

Posted on May 3, 2022 By root


A newly discovered suspected espionage threat actor has been targeting employees focusing on mergers and acquisitions as well as large corporate transactions to facilitate bulk email collection from victim environments.

Mandiant is tracking the activity cluster under the uncategorized moniker UNC3524, citing a lack of evidence linking it to an existing group. However, some of the intrusions are said to mirror techniques used by different Russia-based hacking crews like APT28 and APT29.

“The high level of operational security, low malware footprint, adept evasive skills, and a large Internet of Things (IoT) device botnet set this group apart and emphasize the ‘advanced’ in Advanced Persistent Threat,” the threat intelligence firm said in a Monday report.

The initial access route is unknown but upon gaining a foothold, attack chains involving UNC3524 culminate in the deployment of a novel backdoor called QUIETEXIT for persistent remote access for as long as 18 months without getting detected in some cases.

What’s more, the command-and-control domains — a botnet of internet-exposed IP camera devices, likely with default credentials — are designed to blend in with legitimate traffic originating from the infected endpoints, suggesting attempts on the part of the threat actor to stay under the radar.

“UNC3524 also takes persistence seriously,” Mandiant researchers pointed out. “Each time a victim environment removed their access, the group wasted no time re-compromising the environment with a variety of mechanisms, immediately restarting their data theft campaign.”

CyberSecurity

Also installed by the threat actor is a secondary implant, a web shell, as a means of alternate access should QUIETEXIT stop functioning and for propagating the primary backdoor on another system in the network.

The information-gathering mission, in its final stage, entails obtaining privileged credentials to the victim’s mail environment, using it to target the mailboxes of executive teams that work in corporate development.

“UNC3524 targets opaque network appliances because they are often the most unsecure and unmonitored systems in a victim environment,” Mandiant said. “Organizations should take steps to inventory their devices that are on the network and do not support monitoring tools.”





TheHackersNews/

cyber security news

Post navigation

Previous Post: Will Bitcoin Shoot Over $40,000 — Or Drop To $35,000?
Next Post: The Nightly Mint: Daily NFT Recap

Related Posts

  • Microsoft Discovers New Privilege Escalation Flaws in Linux Operating System cyber security news
  • E.U. Blames Russia for Cyberattack on KA-SAT Satellite Network Operated by Viasat cyber security news
  • Everything We Learned From the LAPSUS$ Attacks cyber security news
  • How to Improve Margins and Scale-Up Service Delivery cyber security news
  • Microsoft Releases Fix for New Zero-Day with May 2022 Patch Tuesday Updates cyber security news
  • [eBook] Your First 90 Days as MSSP: 10 Steps to Success cyber security news

Archives

  • May 2022

Categories

  • bitcoin news
  • cyber security news

Recent Posts

  • Hackers Trick Users with Fake Windows 11 Downloads to Distribute Vidar Malware
  • Cyprus Drafts Crypto Rules, May Introduce Them Before EU Regulations – Regulation Bitcoin News
  • MetaOasis AVAX Hackathon News Report – Press release Bitcoin News
  • Pakistan Can Generate $90 Million Annually if It Introduces a 15% Tax on Crypto Transactions – Emerging Markets Bitcoin News
  • QNAP Urges Users to Update NAS Devices to Prevent Deadbolt Ransomware Attacks

Recent Comments

No comments to show.
  • AXS Jumps Over 20%, as MATIC Falls to 13-Month Low – Market Updates Bitcoin News bitcoin news
  • Ethereum Nears Breakout Zone, Why ETH Might Start Recovery bitcoin news
  • Circle Says USDC Reserve Backed Entirely in Cash and Short-Dated US Treasuries – Bitcoin News bitcoin news
  • ETH Remains Close to 6-Week Low to Start the Weekend – Market Updates Bitcoin News bitcoin news
  • Thousands of WordPress Sites Hacked to Redirect Visitors to Scam Sites cyber security news
  • ALGO Boosted by FIFA Partnership News, as AVAX and Near Rise Higher – Market Updates Bitcoin News bitcoin news
  • Bank of England’s Cunliffe Warns Crypto Will See Tough Times as Federal Reserve Tightens Financial Conditions – Regulation Bitcoin News bitcoin news
  • Demand for Plutus Card’s 8% Crypto Cashback Release Explodes After Crypto.com Saga bitcoin news

Copyright © 2022 Cyber Security And Bitcoin Blockchain News.

Powered by PressBook News Dark theme