1. IT-Security >
  2. Hacking >
  3. TA505 Group adds new ServHelper Backdoor and FlawedGrace RAT to its arsenal


ArabicEnglishFrenchGermanGreekItalianJapaneseKoreanPersianPolishPortugueseRussianSpanishTurkishVietnamese

TA505 Group adds new ServHelper Backdoor and FlawedGrace RAT to its arsenal

RSS Kategorie Pfeil Hacking vom | Quelle: securityaffairs.co Direktlink öffnen

Proofpoint analyzed two strains of malware tracked as ServHelper and FlawedGrace distributed through phishing campaigns by the TA505 crime gang. Security researchers at Proofpoint researchers discovered two strains of malware tracked as ServHelper and FlawedGrace distributed through phishing campaigns by the TA505 crime gang. The ServHelper is a backdoor, experts analyzed two variants of it, while […]

The post TA505 Group adds new ServHelper Backdoor and FlawedGrace RAT to its arsenal appeared first on Security Affairs.

...

Webseite öffnen Komplette Webseite öffnen

Newsbewertung

Kommentiere zu TA505 Group adds new ServHelper Backdoor and FlawedGrace RAT to its arsenal






Ähnliche Beiträge

  • 1. TA505 Group adds new ServHelper Backdoor and FlawedGrace RAT to its arsenal vom 266.62 Punkte ic_school_black_18dp
    Proofpoint analyzed two strains of malware tracked as ServHelper and FlawedGrace distributed through phishing campaigns by the TA505 crime gang. Security researchers at Proofpoint researchers discovered two strains of malware tracked as ServHelper and
  • 2. TA505 Group adds new ServHelper Backdoor and FlawedGrace RAT to its arsenal vom 266.62 Punkte ic_school_black_18dp
    Proofpoint analyzed two strains of malware tracked as ServHelper and FlawedGrace distributed through phishing campaigns by the TA505 crime gang. Security researchers at Proofpoint researchers discovered two strains of malware tracked as ServHelper and
  • 3. AA18-284A: Publicly Available Tools Seen in Cyber Incidents Worldwide vom 201.03 Punkte ic_school_black_18dp
    Original release date: October 11, 2018Summary This report is a collaborative research effort by the cyber security authorities of five nations: Australia, Canada, New Zealand, the United Kingdom, and the United States.[1][2][3][4][5] In it we highlight the use of five publicly a
  • 4. TA17-117A: Intrusions Affecting Multiple Victims Across Multiple Sectors vom 198.63 Punkte ic_school_black_18dp
    Original release date: April 27, 2017 | Last revised: May 14, 2017Systems Affected Networked Systems Overview The National Cybersecurity and Communications Integration Center (NCCIC) has become aware of an emerging sophisticated campaign, occurrin
  • 5. TA505 Hacking Group Launching New Malware ServHelper via Weaponized MS Word Documents vom 158.43 Punkte ic_school_black_18dp
    TA505 threat actors currently launching new malware campaign with a backdoor capability that mainly target the financial institutions via MS Word Documents. TA505 hacking group already had a record of distributing biggest threat campaign  Dridex and widely distributing Locky ransomware tha
  • 6. Researchers Link New Android Backdoor to North Korean Hackers vom 153.92 Punkte ic_school_black_18dp
    The recently discovered KevDroid Android backdoor is tied to the North Korean hacking group APT37, Palo Alto Networks researchers say. Also tracked as Reaper, Group 123, Red Eyes, and ScarCruft, the threat group was observed earlier this year to be using
  • 7. New macOS Backdoor Linked to Cyber-espionage Group vom 142.8 Punkte ic_school_black_18dp
    A recently discovered macOS backdoor is believed to be a new version of malware previously associated with the OceanLotus cyber-espionage group, Trend Micro says. Also known as APT 32, APT-C-00, SeaLotus, and Cobalt Kitty, OceanLotus is believed to be operating o
  • 8. Attackers Using Excel 4.0 Macro Dropper to Spread ServHelper Backdoor vom 132.83 Punkte ic_school_black_18dp
    Digital attackers are using an Excel 4.0 macro dropper to infect unsuspecting users with a new variant of the ServHelper backdoor. In summer 2019, researchers at Deep Instinct detected a new attack campaign launched by digital threat group TA505. Thi
  • 9. Rosenbridge - Hardware Backdoors In Some X86 CPUs vom 125.7 Punkte ic_school_black_18dp
    project:rosenbridge reveals a hardware backdoor in some desktop, laptop, and embedded x86 processors. The backdoor allows ring 3 (userland) code to circumvent processor protections to freely read and write ring 0 (kernel) data. While the backdoor is typical
  • 10. North Korean Hackers Behind Online Casino Attack: Report vom 118.22 Punkte ic_school_black_18dp
    The infamous North Korean hacking group known as Lazarus is responsible for attacking an online casino in Central America, along with various other targets, ESET says. The Lazarus Group has been active since at least 2009 and is said to be associated with a large number o
  • 11. Powershell-RAT – Gmail Exfiltration RAT vom 112.53 Punkte ic_school_black_18dp
    Powershell-RAT is a Python-based Gmail exfiltration RAT that can be used a Windows backdoor to send screenshots or other data as an e-mail attachment. This RAT will help you during red team engagements to backdoor any Windows machines. It tracks the use
  • 12. tRat is a new modular RAT used by the threat actor TA505 vom 112.4 Punkte ic_school_black_18dp
    The threat actor TA505 behind many Dridex and Locky campaigns have been using a new Remote Access Trojan (RAT) dubbed tRat. Researchers at Proofpoint warns that the threat actor TA505 have been using a new Remote Access Trojan (RAT) dubbed tRat that imp