Through the Lens of ISMG: Cyber Siege: The Evolving Malware Landscape | Edition 99
Malware continues to wreak havoc across the cybersecurity world, evolving to target industries and platforms across the globe. From sophisticated espionage campaigns to disruptive malware frameworks, cybercriminals are using advanced tactics to breach sensitive systems.??
In the 99th edition of The Pulse of Cybersecurity, we spotlight six stories that dive into critical incidents of malware infiltration and the global efforts to combat these threats. These stories highlight the urgent need for vigilance and innovation in the fight against ever-evolving cyber adversaries.?
A malware campaign targeting Russian retailers and service businesses aims to deploy remote access tools and install infostealer malware. Kaspersky dubbed the campaign "Horns&Hooves," after a fake organization set up by fraudsters in the 1931 Soviet satirical novel "The Little Golden Calf."?
Hackers exploiting flaws in Cleo Communications software instances had intimate knowledge of their internals and deployed a previously unknown family of malware, security researchers from Huntress said Thursday. Cleo published a patch Wednesday evening.?
An Iranian state hacking group is using custom malware to compromise IoT and OT infrastructure in Israel and the United States. An attack wave from Islamic Revolutionary Guard Corps-affiliated "CyberAv3ngers" swept up fuel management systems made by U.S.-based firm Gilbarco Veeder-Root.?
The German federal information security agency disrupted a botnet that infected thousands of backdoored digital picture frames and media players made with knockoff Android operating systems shipped from China. The agency identified at least 30,000 infected devices.?
Hackers are using a variant of a backdoor that's the hallmark of a Chinese threat actor suspected of ties to Beijing in order to target the cybercriminal underground. The malware "shares near-complete similarity" with a backdoor exclusively used by the Winnti Group.?
A suspected South Asian threat actor targeted a Turkish defense organization, deploying malware via a RAR archive and using alternate data streams to deliver remote access Trojans. The group previously targeted multiple countries including China, India, Pakistan and Bangladesh.?
GovWare 2024: Trust & Security in the Digital Era?
Dive into ISMG's exclusive compendium showcasing 36 in-depth interviews from Singapore’s premier cybersecurity trade event. From geopolitical tensions to emerging technologies like generative AI, explore insights from top cybersecurity professionals across 80 countries.? ?
What’s Inside:?
? Regional strategies for cyber defense?
? Advances in AI and ML for security?
? Thought leadership on today’s evolving threat landscape?
With over 32 years of experience spanning hardware, enterprise resource software, product development and analytics, Rahul Monie, CISO partner at CTO Bridge Solutions, has been center stage for the IT evolution from basic hardware and software to complex data analytics and cybersecurity technology.?
That's all for today. We will be back next week.?
Until then, stay current with the latest happenings in cybersecurity by subscribing to our newsletter and follow us on @ismg_global on Instagram.?
Have a nice day ahead.?
- ISMG Social Media Desk?