article thumbnail

North Korean APT Uses Fake Job Offers as Linux Malware Lure

SecureWorld News

ESET researchers have discovered a new Lazarus Group campaign targeting Linux users. According to a recent blog post : "Operation DreamJob is the name for a series of campaigns where the group uses social engineering techniques to compromise its targets, with fake job offers as the lure.

Malware 74
article thumbnail

Russian Hacker Indicted as Mastermind Behind LockBit Ransomware

SecureWorld News

Khoroshev conceived, developed, and administered Lockbit, the most prolific ransomware variant and group in the world, enabling himself and his affiliates to wreak havoc and cause billions of dollars in damage to thousands of victims around the globe," said Philip R. Sellinger, U.S.

Malware 95
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Microsoft will let IT admins send Windows 11 desktop or taskbar messages

The Verge

“With the shift to hybrid workplaces, we can see that organizations need to better connect with employees in a way that is tailored to individual situations,” explains Heena Macwan, principal group product manager for Windows. “In

Windows 98
article thumbnail

Fed Tech Roundup July 31

CTOvision

Trade Group Collecting Tips on Federal Cybersecurity for White House - Nextgov. Invincea Researchers to Present on Overcoming Security Data Science Challenges and Improving Malware Analysis with Graphical Images at Black Hat USA 2015 Conference. Consumers Rant to FCC about Net Neutrality - Nextgov.

article thumbnail

BlackCat Eats into Its Nine Lives, Threatens More Attacks on Hospitals

SecureWorld News

The FBI and CISA have labeled BlackCat one of the most prolific and damaging ransomware groups currently active. Using the ransomware-as-a-service model, BlackCat developers sell access to their malware tools in exchange for a cut of ransoms extracted from victims. This decentralized approach allows them to cast a wide net.

article thumbnail

Bidding Open on DHS’ $6B Security Hub, House report stresses sharing

CTOvision

” Using a SQL-injection attacks, the group obtained access and installed backdoors into several large payment processing companies, then stole a huge amount of information from the companies. Via Net Security, more here. They then resold these for varying amounts, depending on the origin of the card.

Symantec 226
article thumbnail

4 Ways North Korea Is Targeting Security Researchers

SecureWorld News

Google's Threat Analysis Group (TAG) has been working for several months to try to identify who is behind an ongoing campaign targeting security researchers, specifically those who work on vulnerability research and development at a variety of organizations. However, because they are heroes, they are also targets.