Ausnahme gefangen: SSL certificate problem: certificate is not yet valid ๐Ÿ“Œ Russian APT Turlaโ€™s COMpfun malware uses HTTP status codes to receive commands

๐Ÿ  Team IT Security News

TSecurity.de ist eine Online-Plattform, die sich auf die Bereitstellung von Informationen,alle 15 Minuten neuste Nachrichten, Bildungsressourcen und Dienstleistungen rund um das Thema IT-Sicherheit spezialisiert hat.
Ob es sich um aktuelle Nachrichten, Fachartikel, Blogbeitrรคge, Webinare, Tutorials, oder Tipps & Tricks handelt, TSecurity.de bietet seinen Nutzern einen umfassenden รœberblick รผber die wichtigsten Aspekte der IT-Sicherheit in einer sich stรคndig verรคndernden digitalen Welt.

16.12.2023 - TIP: Wer den Cookie Consent Banner akzeptiert, kann z.B. von Englisch nach Deutsch รผbersetzen, erst Englisch auswรคhlen dann wieder Deutsch!

Google Android Playstore Download Button fรผr Team IT Security



๐Ÿ“š Russian APT Turlaโ€™s COMpfun malware uses HTTP status codes to receive commands


๐Ÿ’ก Newskategorie: Hacking
๐Ÿ”— Quelle: securityaffairs.co

Russia-linked cyberespionage group Turla targets diplomatic entities in Europe with a new piece of malware tracked as COMpfun. Security experts from Kaspersky Lab have uncovered a new cyberespionage campaign carried out by Russia-linked APT Turla that employs a new version of the COMpfun malware. The new malware allows attackers to control infected hosts using a [โ€ฆ]

The post Russian APT Turlaโ€™s COMpfun malware uses HTTP status codes to receive commands appeared first on Security Affairs.

...



๐Ÿ“Œ Russian APT Turlaโ€™s COMpfun malware uses HTTP status codes to receive commands


๐Ÿ“ˆ 128.39 Punkte

๐Ÿ“Œ New COMpfun malware variant gets commands from HTTP error codes


๐Ÿ“ˆ 60.5 Punkte

๐Ÿ“Œ Russian Turla APT Group Hacked Iranian APT C2 Server For Backdoor Access To Expand The Cyber Attack


๐Ÿ“ˆ 44.66 Punkte

๐Ÿ“Œ COMpfun authors spoof visa application with HTTP status-based Trojan


๐Ÿ“ˆ 43.22 Punkte

๐Ÿ“Œ Russia-Linked Turla APT uses new malware in watering hole attacks


๐Ÿ“ˆ 40.75 Punkte

๐Ÿ“Œ Tangled Up: 'Tomiris' APT Uses Turla Malware, Confusing Researchers


๐Ÿ“ˆ 40.75 Punkte

๐Ÿ“Œ AcidBox, a malware that borrows Turla APT exploit, hit Russian organizations


๐Ÿ“ˆ 39.64 Punkte

๐Ÿ“Œ New ComRAT Malware Uses Gmail to Receive Commands and Exfiltrate Data


๐Ÿ“ˆ 39.09 Punkte

๐Ÿ“Œ New Fileless Malware Uses DNS Queries To Receive PowerShell Commands


๐Ÿ“ˆ 39.09 Punkte

๐Ÿ“Œ New ComRAT Malware Uses Gmail to Receive Commands and Exfiltrate Data


๐Ÿ“ˆ 39.09 Punkte

๐Ÿ“Œ Russian hacker group use HTTP status codes to control malware implants


๐Ÿ“ˆ 36.45 Punkte

๐Ÿ“Œ Russian hacker group using HTTP status codes to control malware implants


๐Ÿ“ˆ 36.45 Punkte

๐Ÿ“Œ 10/25/19 Turla APT Group Hacks OilRig APT Group | AT&T ThreatTraq


๐Ÿ“ˆ 36.33 Punkte

๐Ÿ“Œ Russia-linked Turla APT uses new TinyTurla-NG backdoor to spy on Polish NGOs


๐Ÿ“ˆ 36.14 Punkte

๐Ÿ“Œ Russian-Speaking Turla Joins APT Elite


๐Ÿ“ˆ 35.03 Punkte

๐Ÿ“Œ Three New Pacifier APT Components Point to Russian-Linked Turla Group


๐Ÿ“ˆ 35.03 Punkte

๐Ÿ“Œ UK/US investigation revealed that Russian Turla APT masqueraded as Iranian hackers


๐Ÿ“ˆ 35.03 Punkte

๐Ÿ“Œ Russian APT Turla targets 35 countries on the back of Iranian infrastructure


๐Ÿ“ˆ 35.03 Punkte

๐Ÿ“Œ Palo Alto Reveals New Features in Russian APT Turla's Kazuar Backdoor


๐Ÿ“ˆ 35.03 Punkte

๐Ÿ“Œ Status Codes Explained (FAQ). A List Of Every Vital HTTP Response Status Code And What They Mean.


๐Ÿ“ˆ 33.33 Punkte

๐Ÿ“Œ Turla APT Hackers Attack Microsoft Exchange Server using Powerful Malware to Spying on Emails


๐Ÿ“ˆ 31.31 Punkte

๐Ÿ“Œ Turla APT Returns with New Malware, Anti-Censorship Angle


๐Ÿ“ˆ 31.31 Punkte

๐Ÿ“Œ Turla APT Hackers Using New Malware to Break The TLS Encrypted Web Traffic Communication


๐Ÿ“ˆ 31.31 Punkte

๐Ÿ“Œ Russia-linked APT Turla used a new malware toolset named Crutch


๐Ÿ“ˆ 31.31 Punkte

๐Ÿ“Œ Russia-Linked "Turla" Group Uses New JavaScript Malware


๐Ÿ“ˆ 31.12 Punkte

๐Ÿ“Œ Turla's Updated ComRAT Malware Uses Gmail for C&C Communication


๐Ÿ“ˆ 31.12 Punkte

๐Ÿ“Œ Turla Uses Old Malware Infrastructure to Attack Ukrainian Institutions


๐Ÿ“ˆ 31.12 Punkte

๐Ÿ“Œ COMpfun successor Reductor infects files on the fly to compromise TLS traffic


๐Ÿ“ˆ 30.75 Punkte

๐Ÿ“Œ COMpfun successor Reductor infects files on the fly to compromise TLS traffic


๐Ÿ“ˆ 30.75 Punkte

๐Ÿ“Œ Understanding APT, APT-Cache and Their Frequently Used Commands


๐Ÿ“ˆ 30.69 Punkte

๐Ÿ“Œ DarkHydrus APT Uses Google Drive to Send Commands to RogueRobin Trojan


๐Ÿ“ˆ 30.5 Punkte

๐Ÿ“Œ DarkHydrus APT Uses Google Drive to Send Commands to RogueRobin Trojan


๐Ÿ“ˆ 30.5 Punkte

๐Ÿ“Œ AcidBox: Rare Malware Repurposing Turla Group Exploit Targeted Russian Organizations


๐Ÿ“ˆ 30.01 Punkte











matomo