You searched for OilRig | SC Media

Your search for OilRig returned 9 results

Active Filters

Click on a filter below to refine your search. Remove a filter to broaden your search.

Bradley Barth remove

Your search for OilRig returned 9 results

Sort Results:

Relevant Recent

Did you mean: oblig

Malware

Double trouble: TwoFace webshell linked to malicious websites targeting Israeli institutions

An analysis of a recently discovered webshell used to harvest credentials from an unnamed Middle Eastern organization has unearthed a complex malicious infrastructure that appears to be targeting Israeli institutions and may possibly be linked to the Iranian APT group OilRig, according to researchers. The webshell, called TwoFace, was discovered by Palo Alto Networks’ Unit…
APTs/cyberespionage

Report: Multiple groups likely collaborating on Shamoon malware campaign

Analysis of the 2016-2017 Shamoon malware attacks against Saudi organizations suggests that multiple hacker groups may be collaborating on this effort on behalf of a nation-state actor, according to a new blog post and technical analysis published this week by McAfee. “We found that the latest Shamoon campaigns… are connected to other notable campaigns, and…
Malware

New Backdoor targets Russian businesses in apparent spear phishing campaign

What appears to be an ongoing spear phishing campaign has been targeting Russian-speaking businesses, including banks and mining firms, with a newly discovered backdoor malware program since late June, according to researchers at Trend Micro. The backdoor, whose final payload is a malicious XML file by the name of JS_GETFO.ZHEG-A, is capable of downloading and…
Network Security

Deloitte: Upstream oil and gas operations remain prone to cyberattacks, especially drilling

The oil and gas industry’s overall cybersecurity posture is lacking, especially as upstream operations within the sector grow increasingly vulnerable to high-severity cyberattacks, a new online report by Deloitte warns. “Whether hackers use spyware targeting bidding data of fields, malware infecting production control systems, or denial of service that blocks the flow of information through control…
Next post in Network Security