Kaspersky Lab researchers participated in a Reddit AMA, touching on topics such as attack attribution, critical infrastructure security, attacker and researcher tradecraft, and the shortage of security talent.
Tag Archives: advanced persistent threat
Relentless Sofacy APT Attacks Armed With Zero Days, New Backdoors
Researchers at Kaspersky Lab release an update on the Sofacy gang, also known as APT28, explaining a set of new malware implants, backdoors and zero days at the group’s disposal.
China APT Gang Targets Hong Kong Media via Dropbox
A Chinese APT gang is targeting Hong Kong media outlets with backdoors that connect to legitimate Dropbox accounts.
Turla APT Group Abusing Satellite Internet Links
Researchers at Kaspersky Lab have revealed that the Turla APT gang is using satellite-based Internet links to hide command-and-control activities.
Darkhotel APT Latest to Use Hacking Team Zero Day
The Darkhotel APT gang has extended its geographic reach to victims in a host of additional countries, and has added to its cache of zero days with its use of a HackingTeam exploit for a Flash zero-day vulnerability.
APT Group Gets Selective About Data it Steals
Dell SecureWorks researchers today at Black Hat released a new report on Emissary Panda, or TG-3390, a China-sponsored APT gang that has refined the types of data it covets.
Linux Modules Connected to Turla APT Discovered
Researchers at Kaspersky Lab have found two Linux modules connected to the Turla APT campaigns.
Russian APT28 Group Linked to NATO, Political Attacks
APT28, a Russian hacking group, has been tied to attacks against the country of Georgia, Eastern European political and military organizations, and NATO, a report from FireEye said.