An advanced persistent threat (APT) hacking group has been exploiting an unpatched Internet Explorer (IE) vulnerability to infect Windows PCs with malware.
Security researchers from Lookout have discovered two malicious samples of trojanized ViperRAT apps in Google Play Store, each disguised as custom chat apps. Hackers appear to have used the two Android apps to conduct highly targeted surveillance in the Middle East.
Security researchers have identified a new MacOS backdoor potentially linked to the OceanLotus threat group, also known as “APT 32”, “SeaLotus” and “Cobalt Kitty” to name a few.
A highly sophisticated cyberespionage campaign dubbed Slingshot has been uncovered by Kaspersky security researchers. The campaign targets MikroTik routers to compromise them and use as a springboard to attack victims’ computers, as the company revealed in last week’s Kaspersky Security Analyst Summit (SAS).
The Sofacy group (aka APT28, Fancy Bear, and Pawn Storm) have allegedly attacked and breached German government’s secure computer network. Many security experts believe the cyberespionage group has ties back to the Russian government.