APT (Targeted attacks)

APT reports

Red October – Java Exploit Delivery Vector Analysis

Since the publication of our report, our colleagues from Seculert have discovered and posted a blog about the usage of another delivery vector in the Red October attacks (http://blog.seculert.com/2013/01/operation-red-october-java-angle.html).
In addition to Office documents (CVE-2009-3129, CVE-2010-3333, CVE-2012-0158), it appears that the attackers also infiltrated victim network(s) via Java exploitation (35f1572eb7759cb7a66ca459c093e8a1 – NewsFinder.jar), known as the Rhino exploit (CVE-2011-3544).

APT reports

Shamoon The Wiper: Further Details (Part II)

There have been persistent media reports that the Shamoon wiper malware we previously covered is linked to attacks against Saudi Aramco. The hardcoded date in the body of destructor matches exactly the declaration by a hacker group about the date and time when the Saudi Aramco company would had been hit but we still cannot

Incidents

What was that Wiper thing?

In April 2012, several stories were published about a mysterious malware attack shutting down computer systems at businesses throughout Iran. Several articles mentioned that a virus named Wiper was responsible. Yet, no samples were available from these attacks, causing many to doubt the accuracy of these reports. Following these incidents, the International Telecommunications Union (ITU)

Reports
Subscribe to our weekly e-mails

The hottest research right in your inbox