Cyber Espionage | SC Media

Cyber Espionage

The DOJ to investigate Uber breach

Report: Uber employee used data-scraping tool to gather info on Australian competitor

An Uber employee used a data-scraping tool to round up online data concerning an Australian competitor in order to poach drivers from its business, according to a report this week from ABC News in Australia. Reportedly created in 2015, the tool, called Surfcam, was previously reported to have been used against a rival ride-service company…

Reports: Israeli officials’ devices hacked; data possessed by Iran

Hackers stole information from former Israeli prime minister Ehud Barak’s computer and phone months ago and sold it to Iran, according to multiple news outlets, citing a TV report by Israel’s Channel 12 this past weekend. The news reportedly broke several days after a separate Channel 12 story that said Iranian intelligence directly hacked the…

Panel: Laws to curb influence campaigns on social media should stress transparency, collaboration

Security and trust executives from social media platforms Facebook and Twitter said at a RSA 2019 keynote panel this week that their companies would welcome additional transparency regulations as a countermeasure against the weaponization of the internet by foreign adversaries. In addition, other experts on the panel suggested regulations that would require the identification of…

‘Farseer’ backdoor targets Windows systems, linked to ‘HenBox’ malware

A recently discovered backdoor program designed to compromise Windows users has strong ties to HenBox, an Android-based malware known to target members of the Uyghur ethnic group in China, as well as smartphones from Chinese manufacturer Xiaomi. Dubbed Farseer, the previously undisclosed malware dates back at least two-and-a-half years, according to Palo Alto Networks’ Unit 42…

North Korean hackers allegedly pick on Russian targets for a change

The reputed North Korean APT actor known as Lazarus Group (aka Hidden Cobra) typically focuses its hacking efforts on South Korea, Japan and the U.S., but one of its suspected campaigns from last January surprisingly appears to have targeted Russian businesses with its signature Lazarus backdoor malware. Taking place from Jan. 26-31, the phishing campaign…

Layering EMV chip, tokenization, encryption bolsters card payment security

Chip and PIN protections may fall short as future threats materialize

The protections that chip and PIN payment card solutions offer may fall short as cybercriminals begin installing command-and-control malware on infected EMV device readers, a new report warns. Cybercriminals could begin repurposing ATM EMV malware to attack retail environments by infecting point-of-sale (POS) machines (possibly via malicious USB drives) and then introducing an altered EMV…

spyware

Cybercriminals secretly bundle anti-censorship app with spyware framework

A legitimate application that’s supposed to help users access censored or blocked websites was secretly bundled with Android spyware and made available for download on third-party marketplaces last year. The app, known as Psiphon and packaged as com.psiphon3, has been safely downloaded from the official Google Play Store over 50 million times. But users who attained…

Report: Chinese cyberspies hacked MSP, retailer and law firm in economic espionage campaign

The Chinese state-sponsored threat actor APT10 used stolen remote access software credentials to infiltrate the network of Norwegian managed services provider Visma last year, likely in an effort to launch secondary attacks against the MSP’s clients. An investigation into the cyber espionage campaign revealed that APT10, aka Stone Panda, used similar tactics to invade the…

Next post in APTs/cyberespionage