RSS The Hacker News
  • Google Exposes GLASSBRIDGE: A Pro-China Influence Network of Fake News Sites November 23, 2024
    Government agencies and non-governmental organizations in the United States have become the target of a nascent China state threat actor known as Storm-2077. The adversary, believed to be active since at least January 2024, has also conducted cyber attacks against the Defense Industrial Base (DIB), aviation, telecommunications, and financial and legal services across the world, […]
  • North Korean Hackers Steal $10M with AI-Driven Scams and Malware on LinkedIn November 23, 2024
    The North Korea-linked threat actor known as Sapphire Sleet is estimated to have stolen more than $10 million worth of cryptocurrency as part of social engineering campaigns orchestrated over a six-month period. These findings come from Microsoft, which said that multiple threat activity clusters with ties to the country have been observed creating fake profiles […]
  • Russian Hackers Deploy HATVIBE and CHERRYSPY Malware Across Europe and Asia November 22, 2024
    Threat actors with ties to Russia have been linked to a cyber espionage campaign aimed at organizations in Central Asia, East Asia, and Europe. Recorded Future's Insikt Group, which has assigned the activity cluster the name TAG-110, said it overlaps with a threat group tracked by the Computer Emergency Response Team of Ukraine (CERT-UA) as […]
  • APT-K-47 Uses Hajj-Themed Lures to Deliver Advanced Asyncshell Malware November 22, 2024
    The threat actor known as Mysterious Elephant has been observed using an advanced version of malware called Asyncshell. The attack campaign is said to have used Hajj-themed lures to trick victims into executing a malicious payload under the guise of a Microsoft Compiled HTML Help (CHM) file, the Knownsec 404 team said in an analysis […]
  • China-Linked TAG-112 Targets Tibetan Media with Cobalt Strike Espionage Campaign November 22, 2024
    A China-linked nation-state group called TAG-112 compromised Tibetan media and university websites in a new cyber espionage campaign designed to facilitate the delivery of the Cobalt Strike post-exploitation toolkit for follow-on information collection. "The attackers embedded malicious JavaScript in these sites, which spoofed a TLS certificate error to trick visitors into downloading a