News & Analysis as of

Cyber Espionage Malware

Ankura

Ankura CTIX FLASH Update - January 2023 - 4

Ankura on

PayPal Discloses December 2022 Security Incident Involving Credential Stuffing Attacks - PayPal has begun sending out notification letters to individuals impacted by a security incident that occurred in early December...more

Ankura

Ankura CTIX FLASH Update - January 2023 - 3

Ankura on

New SEO Poisoning Campaign Utilizing "Gootkit" Malware Loader Targets the Australian Healthcare Sector - The operators of the "Gootkit" malware loader (otherwise known as "Gootloader") have started a new search engine...more

Ankura

Ankura CTIX FLASH Update - January 2023 - 2

Ankura on

Health and Human Services Organization Discloses Ransomware Attack and Breach from Early 2022 - On January 5, 2023, Maternal & Family Health Services (MFHS) disclosed that a ransomware attack occurred on April 4, 2022, and...more

Ankura

Ankura CTIX FLASH Update - September 2022

Ankura on

"EvilProxy" Provides Low-Skill Threat Actors Access to Advanced Phishing Techniques - A new Phishing-as-a-Service (PaaS) platform dubbed "EvilProxy" has been discovered by Resecurity researchers. PaaS platforms allow...more

Ankura

Ankura CTIX FLASH Update - August 2022 - 2

Ankura on

Anti-Cheat, Code-Signed Driver Abused to Bypass Privileges and Deploy Ransomware - Trend Micro researchers observed a ransomware infection in late July 2022 that involved a code-signed driver called "mhyprot2.sys", which...more

Ankura

A Cyber Threat Analysis of the Russia-Ukraine Conflict

Ankura on

The Ankura Cyber Threat Investigations & Expert Services (CTIX) team conducted a technical analysis of historical and ongoing adversarial activity associated with the current Ukrainian/Russian conflict. In doing so, the CTIX...more

Rothwell, Figg, Ernst & Manbeck, P.C.

Spy Games: How Insider/Outsider Threats Have Become the Newest Cybersecurity Legal Risk

Cybersecurity does not just pose technical challenges; companies must always keep their eye on the human component of cyber risk.  For example, even the most damaging and sophisticated hacks – such as the recent Twitter hacks...more

Sheppard Mullin Richter & Hampton LLP

Espionage and Export Controls: The iPhone Hack Highlights The New World of Warfare

Last week, researchers at Citizen Lab uncovered sophisticated new spyware that allowed hackers to take complete control of anyone’s iPhone, turning the phone into a pocket-spy to intercept communications, track movements and...more

King & Spalding

Coordinated Hackers Infiltrate 200 Targeted Employees’ LinkedIn Networks

King & Spalding on

Cybersecurity researchers at the Dell SecureWorks Counter Threat Unit (“Dell CTU”) uncovered a network of approximately 25 fake LinkedIn profiles that Dell CTU believes were used by an Iran-linked hacker group to establish at...more

King & Spalding

Project CAMERASHY Details Cyberespionage By China’s Military

King & Spalding on

In a story reminiscent of a Tom Clancy plot, the Wall Street Journal reported last Thursday on “meticulously documented” cyberespionage conducted by China’s People’s Liberation Army (“PLA”) Unit 78020 to further strategic...more

Blank Rome LLP

Verizon’s Data Breach Report Reveals The Nine Most Pressing Corporate Security Threats

Blank Rome LLP on

As April comes to a close, it’s time once again for Verizon Enterprise Solutions’ Data Breach Investigations Report to remind us just how important data security is to the corporate world. Released Wednesday, the report,...more

11 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide