At the moment the perpetrators of these attacks are unknown, but they are targeting Macs, with malware that allows backdoor access to the devices Once in the malware, bypasses various MacOS defences and is then able to exfiltrate a range of data from the machines, including keystrokes, emails, documents, files, …
Pro-Ukraine activists targeted by Russian hackers
Google’s Threat Analysis Group (TAG), is reporting that Russian-backed threat groups are continuing focusing their attacks on Ukrainian organizations and activists supporting Ukraine. Russian hacking group, Turla, have been detected distributing Android malware, CyberAzov app. Turla has been publicly linked to Russia’s Federal Security Service (FSB). Continued cyber activity in …
Continue reading “Pro-Ukraine activists targeted by Russian hackers”
Industrial systems as targets for threat actors – this why you need a software policy. Do you have one?
Industrial systems, large and small run on computers – so why not attack them? So here is the scenario – which Octagon has had to deal with in the past – someone leaves and forgets to leave the password for a system that is accessed only occasionally. You cannot contact …
OpenDocument files distributing stealth malware – make sure your team can recognise these types of attack.
This report is from HP’s Threat Research Blog and is about a threat discovered impacting hotels in South America. But it illustrates the wide range of threats that can get to you via an email attachment and has some examples you can look at. Stealthy OpenDocument Malware Deployed Against Latin …
