![]() ![]() Microsoft Monday confirmed a China-based ransomware operator - tracked as DEV-0401 - had exploited the vulnerability ( CVE-2021-44228) in VMware Horizon as early as January 4. The forum is asking for additional input and feedback from industry stakeholders on the draft.Hackers are actively exploiting a Log4Shell vulnerability in VMware‘s Horizon virtual desktop platform to deploy ransomware and other malicious packages, U.K.’s National Health Service (NHS) warned last week. It has been additionally linked to the theft of $100 million in crypto assets from Harmony’s Horizon Bridge, as well as the theft of $625 million in cryptocurrency from the Ronin Network – the sidechain utilized by the game Axie Infinity.Ĭanada appears to be working towards a more unified cybersecurity front in late August, the CIO Strategy Council announced that it was drafting a national occupational standard for the cybersecurity staff of organizations. The group also claimed responsibility for the WannaCry ransomware attack in 2017. TechCrunch reported that the Lazarus group is financially motivated and best known for hacking Sony in 2016. “This activity aligns with historical Lazarus intrusions targeting critical infrastructure and energy companies to establish long-term access to siphon off proprietary intellectual property.” “The main goal of these attacks was likely to establish long-term access into victim networks to conduct espionage operations in support of North Korean government objectives,” Cisco Talos’ researchers said in their report. But Cisco Talos additionally found that Lazarus has also been employing a previously unknown remote access trojan (RAT) called MagicRAT to not only spy but also steal credentials from infected computers. Lazarus has been utilizing the malware “VSingle” and “YamaBot” to spy on and surreptitiously access the affected systems, it was noted.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |