Reports have implicated a sophisticated piece of malware known as Regin that has been in use for years. Designed to carry out long-term stealthy surveillance on would-be victims, telecom companies are believed to have been its primary targets.
Backdoors are applications that open computers to remote access, and are used as a way to avoid detection and carry out targeted attacks. How can IT administrators secure their networks against these backdoor techniques?
During the first half of 2014, attacks against Asia-Pacific countries showed some notable techniques used by attackers to evade detection and steal data. This report details the targeted attack campaigns and trends over that period.
For many organizations, the question is no longer if they fall victim to a targeted attack, but when. In such an event, how an organization responds will determine whether it becomes a serious event or if it stays a mere annoyance.
Despite the availability of fixes related to the Sandworm vulnerability (CVE-2014-4114), new attacks related to this flaw are still being spotted. These attacks contain a new routine that could prevent detection.
This Trend Micro paper unravels a series of attacks that targets military officials and defense contractors. Dubbed as “Operation Pawn Storm,” the group of threat actors use two known attack vectors: spear phishing emails and a network of phishing websites.