
Russian cyber group exploits seven-year-old network vulnerabilities for long-term espionage
The group, linked to FSB Center 16, has been scanning the internet for end-of-life software, which it has found in droves.
The group, linked to FSB Center 16, has been scanning the internet for end-of-life software, which it has found in droves.
A new Microsoft report finds that the long-running threat group has gained positions on state-aligned ISPs and Russian telecoms, while tricking foreign embassy staff to download custom malware.
Known as Glutton, researchers at QiAnXin’s XLab believe Winnti is responsible for the malware.
A Russian nation-state threat actor has been observed leveraging tools from other cybercriminal groups to compromise targets in Ukraine, a recent report by Microsoft Threat Intelligence disclosed. This clandestine approach, which is the second time in as many weeks that Microsoft has highlighted the group’s effort, shows how Turla uses a wide range of attack […]
Both Microsoft and Lumen’s BlackLotus Labs found Turla spying on Afghanistan and India via Pakistani infrastructure.
The work has been carried out by a newly identified group dubbed “MustachedBouncer,” according to researchers with ESET.
A law enforcement effort dubbed “Medusa” targeted malware deployed by Moscow’s Federal Security Service, officials said Tuesday.
The group’s first known activity in Ukraine after Russia’s invasion registered dormant domains in order to obscure their attacks.
Multiple ongoing hacking efforts are either connected to or using the Russian military assault to target a wide range of entities.
They’re using fake job documents to target victims.