Cyber security news for all


    Blackberry research shows hacker development towards the use of Linux servers

    Blackberry has exposed the spy activity of APT groups that work in the interests of the Chinese government. These groups have been systematically attacking servers, Windows systems and mobiles for almost a decade and have so far remained undetected.

    Civil Contractors Who Work In The Interests Of The Chinese Government

    The report, entitled “Decade of the RATs”, shows that five particular groups of civilian contractor hackers in China have been coordinating their efforts and sharing information in a wide-ranging cyber espionage campaign directed at industries and government agencies all over the world.

    The APT groups examined civil contractors who work in the interests of the Chinese government and are willing to share tools, techniques, infrastructure and targeted information with each other and with government officials. The APT groups have so far pursued different goals and focused on a broad spectrum. However, it was found that there is significant collaboration between these groups, particularly as far as the server platforms are concerned.

    One of the Android malware samples is very similar to the code of a commercially available penetration test tool, but the malware was created almost two years before the first purchase of the commercial tool. Several new variants of known malware that are spread by virus protection through the use of code signature certificates as adware. This tactic is intended to increase the attack rate, as it is hoped that the AV flags will only be dismissed as another sign of constant adware warnings.

    It Doesn’t Stop At The Home Office Either

    The majority of employees have left the office to curb the spread of the corona virus, the data remains in the company’s data centers, most of which run on Linux. And that’s not a small problem. Linux runs almost all leading websites of all web servers. Defensive coverage within environments is immature at best and robust endpoint protection products are often underused or lack the skills to defend them. Companies also frequently used this servers as a network for other operations, so that it is constantly switched on and poorly defended.

    Recent Articles

    Judge issues injunction against WeChat

    The US government wanted to take action against the app WeChat. A judge stood sideways. The app should disappear from the platforms in the...

    Mail provider Tutanota becomes target of cyber attacks

    Over the weekend, ongoing DDoS attacks and an infrastructure problem resulted in downtime for hundreds of users. While some were able to mitigate most...

    Amazon accounts are the new target of cyber criminals

    Amazon is a popular target for cyber criminals who want to exploit the trust and image of the company among its customers with emails....

    Hackers stole thousands of passport data in Argentina

    In response to millions of dollars ransom refused by the Argentine Immigration Service, a ransomware group released passport data from hundreds of thousands of...

    USA wants to improve cybersecurity of space systems

    CISA has published a table this week that summarizes Chinese activities against cybersecurity. Some attacks have succeeded and enabled hackers to gain a foothold...

    Related Stories

    Leave A Reply

    Please enter your comment!
    Please enter your name here

    Stay on op - Ge the daily news in your inbox