Tag: APT Group

New APT Group Red Stinger Targets Military and Critical Infrastructure in Eastern Europe
News

New APT Group Red Stinger Targets Military and Critical Infrastructure in Eastern Europe

A previously unreported advanced persistent threat (APT) actor called Red Stinger has been linked to operations targeting Eastern Europe since 2020. "Military, transportation, and critical infrastructure were some of the entities being targeted, as well as some involved in the September East Ukraine referendums," Malwarebytes said in a study released today. Depending on the campaign, the attackers were able to steal USB devices, keyboard input, microphone recordings, and pictures. Red Stinger overlaps with a threat group that Kaspersky identified as Bad Magic last month and that read more New APT Group Red Stinger Targets Military and Critical Infrastructure in Eastern Europe. With ReconBee.com Stay ahead of the latest threats with in-depth coverage of cyber attacks and cybers...
Dragon Breath APT Group Using Double Clean App Technique to Target Gambling Industry
News

Dragon Breath APT Group Using Double Clean App Technique to Target Gambling Industry

By using a novel DLL side-loading strategy, the advanced persistent threat (APT) actor known as Dragon Breath has been seen to increase the complexity of its attacks. "The attack is based on a classic side-loading attack, consisting of a clean application, a malicious loader, and an encrypted payload, with various modifications made to these components over time," said Sophos researcher Gabor Szappanos. The most recent campaigns introduce a new twist in which a first-stage clean programme'side imports a second clean application and automatically executes it. The malicious loader DLL is side-loaded by the second clean application read more Dragon Breath APT Group Using Double Clean App Technique to Target Gambling Industry. With ReconBee.com Stay ahead of the latest threats with i...