Tag Archives: threat actor

FBI, DHS Provide Information on Russian Intell Agency’s Cyber Exploitation Techniques

NSA-CISA-FBI-UK NCSC

The FBI and the Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency (CISA) have released a joint advisory to provide information on cyber tools and techniques used by Russian Foreign Intelligence Service actors to compromise government networks, information technology companies and think tanks. FBI also observed that SVR actors have transitioned from using malware to homing in on cloud-based platforms. 

Read More »

FBI-CISA Joint Advisory Links Nation-State Actors to Microsoft Exchange Server Compromise

Ransomware

The FBI and the Cybersecurity and Infrastructure Security Agency have issued a joint advisory saying hackers trying to exploit vulnerabilities in on-premises Microsoft Exchange Servers include nation-state actors and that the targeted organizations in this breach appear to match the entities that are being zeroed in by threat actors from China, Nextgov reported Thursday.

Read More »

CISA, Treasury, FBI Issue Advisory on North Korea’s Cryptocurrency Malware ‘AppleJeus’

Ransomware

The Cybersecurity and Infrastructure Security Agency (CISA), Department of the Treasury (DOT) and the FBI have released a joint advisory about the AppleJeus malware and other indicators of compromise that North Korea-backed threat actors use to perform cryptocurrency theft. The joint advisory released Wednesday provides technical details about seven versions of AppleJeus malware that Hidden Cobra actors have been using since 2018. 

Read More »

CISA Warns Organizations of Techniques Used by Hackers to Compromise Cloud Services

AWS Secret Region IL-6

The Cybersecurity and Infrastructure Security Agency (CISA) has issued an analysis report in response to cyber attacks on cloud services of various organizations. The agency also found that hackers take advantage of email forwarding rules created by users to gain access to sensitive data. CISA has recommended several measures to help organizations protect cloud environments.

Read More »