Jochen Michels’ Post

View profile for Jochen Michels, graphic

In the calm lies the power! --- Private account - views are my own.

Have a look at the cybersecurity news of the week!

View organization page for Kaspersky, graphic

439,958 followers

🔍 APT Research, Year-End Reviews, and Other Cybersecurity News of the Week 👮♀️ The new Ymir ransomware family employs advanced evasion techniques and robust encryption. The attackers follow up RustyStealer infections. https://lnkd.in/gKwFdRmk 🧭 A review of financially motivated threats in 2024 and predictions for 2025. https://lnkd.in/d5cnvFYG 👀 A detailed analysis of the complex modular Windows implant by APT41. DeepData malware is an evolution of LightSpy framework. https://lnkd.in/djkNAQjq 🔍 A detailed overview of industrial cybersecurity incidents in Q2 2024. https://lnkd.in/druzcue2 🔎 Ransomware targets cloud infrastructure: TTPs of gangs Indosec, Pandora, and RansomES. https://lnkd.in/dpQejhKA ➡️ The new Python malware PXA Stealer, likely linked to CoralRaider APT, has been detected in government and educational institutions in India and Europe. Interestingly, its targeting contradicts the malware's "interests," as it collects passwords for crypto wallets & gaming services. https://lnkd.in/gebMUs6B 🍏 Analysis of the new Lazarus technique used in RustyAttr malware for macOS: code is hidden in extended attributes of the app bundle for stealth. https://lnkd.in/gh_kyuv7 🔄 Detailed technical analysis of how infostealers bypass Chrome app-bound encryption. As a reminder, Google released a new method to protect cookies from theft this year, which infostealers have overcome (at the cost of reduced stealth). https://lnkd.in/d9JvtbXh 👩💻 Domain delegation errors are being widely exploited by criminals. Misconfigured DNS allows phishing and scam sites to be hosted on reputable company domains. Researchers found 800,000 vulnerable domains, with 70,000 actually compromised. https://lnkd.in/dDgZR-QV 📥 Technical analysis of Strela stealer, primarily targeting Europe. It spreads through phishing, notably using genuine emails about sent invoices—criminals use emails they previously stole. https://lnkd.in/gQhPVBnK Malicious QR codes now in the mail: Swiss residents received paper letters, allegedly from the local meteorological agency, inviting them to install a new weather app. The link distributed the Coper banking trojan. https://lnkd.in/dUxePZ7g #news #digest #APT #cybersecurity

  • No alternative text description for this image

To view or add a comment, sign in

Explore topics