Ke3chang group targets diplomatic organizations in Europe

Discussion in 'malware problems & news' started by guest, Jul 18, 2019.

  1. guest

    guest Guest

    This data-stealing malware waits for you to click a mouse button three times before going into action
    Cyber-espionage campaign is thought to be the work of Ke3chang, an ATP hacking group which has been active for ten years
    July 18, 2019

    https://www.zdnet.com/article/this-...-button-three-times-before-going-into-action/
    ESET: Okrum: Ke3chang group targets diplomatic missions
    (PDF - 980 KB): https://www.welivesecurity.com/wp-content/uploads/2019/07/ESET_Okrum_and_Ketrican.pdf
     
    Last edited by a moderator: Jul 24, 2019
  2. guest

    guest Guest

    Hacking group builds new Ketrum malware from recycled backdoors
    May 26, 2020
    https://www.bleepingcomputer.com/ne...s-new-ketrum-malware-from-recycled-backdoors/
    Intezer: The Evolution of APT15’s Codebase 2020
     
  3. guest

    guest Guest

    Connection discovered between Chinese hacker group APT15 and defense contractor
    July 2, 2020
    https://www.zdnet.com/article/conne...se-hacker-group-apt15-and-defense-contractor/
     
  4. guest

    guest Guest

    Going Down the Spyware Rabbit Hole with SilkBean Mobile Malware
    An Android spyware attack was recently discovered that targeted the Uyghur ethnic minority group – since 2013
    July 22, 2020
    https://threatpost.com/going-down-the-spyware-rabbit-hole-with-silkbean-mobile-malware/157619/
     
  5. guest

    guest Guest

    Chinese APT Group Vixen Panda Targets Iranian Government Entities
    By Alessandro Mascellino @a_mascellino - January 18, 2023
    Palo Alto Networks - Unit42: Chinese Playful Taurus Activity in Iran
     
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.