Security News
![Russian Hackers Tricked Ukrainians with Fake "DoS Android Apps to Target Russia"](/static/build/img/news/russian-hackers-tricked-ukrainians-with-fake-dos-android-apps-to-target-russia-small.jpg)
Russian threat actors capitalized on the ongoing conflict against Ukraine to distribute Android malware camouflaged as an app for pro-Ukrainian hacktivists to launch distributed denial-of-service attacks against Russian sites. "The apps were not distributed through the Google Play Store, but hosted on a domain controlled by the actor and disseminated via links on third party messaging services."
![Russian Hackers Using DropBox and Google Drive to Drop Malicious Payloads](/static/build/img/news/russian-hackers-using-dropbox-and-google-drive-to-drop-malicious-payloads-small.jpg)
The Russian state-sponsored hacking collective known as APT29 has been attributed to a new phishing campaign that takes advantage of legitimate cloud services like Google Drive and Dropbox to deliver malicious payloads on compromised systems. What's changed in the newer iterations is the use of cloud services like Dropbox and Google Drive to conceal their actions and retrieve additional malware into target environments.
![EU warns of Russian cyberattack spillover, escalation risks](/static/build/img/news/eu-warns-of-russian-cyberattack-spillover-escalation-risks-small.jpg)
The Council of the European Union said today that Russian hackers and hacker groups increasingly attacking "Essential" organizations worldwide could lead to spillover risks and potential escalation. "This increase in malicious cyber activities, in the context of the war against Ukraine, creates unacceptable risks of spillover effects, misinterpretation and possible escalation," the High Representative on behalf of the EU said Tuesday.
![Russian hackers use fake DDoS app to infect pro-Ukrainian activists](/static/build/img/news/russian-hackers-use-fake-ddos-app-to-infect-pro-ukrainian-activists-small.jpg)
Google's Threat Analysis Group, whose primary goal is to defend Google users from state-sponsored attacks, said today that Russian-backed threat groups are still focusing their attacks on Ukrainian organizations. In a report regarding recent cyber activity in Eastern Europe, Google TAG security engineer Billy Leonard revealed that hackers part of the Turla Russian APT group have also been spotted deploying their first Android malware.
![Russian SVR hackers use Google Drive, Dropbox to evade detection](/static/build/img/news/russian-svr-hackers-use-google-drive-dropbox-to-evade-detection-small.jpg)
State-backed hackers part of Russia's Federation Foreign Intelligence Service have started using Google Drive legitimate cloud storage service to evade detection. "We have discovered that their two most recent campaigns leveraged Google Drive cloud storage services for the first time," Unit 42 analysts who spotted the new trend said.
![Russian hacktivists take down Norway govt sites in DDoS attacks](/static/build/img/news/russian-hacktivists-take-down-norway-govt-sites-in-ddos-attacks-small.jpg)
Norway's National Security Authority published a statement yesterday warning that some of the country's most important websites and online services are being rendered inaccessible due to distributed denial of service attacks. DDoS attacks are a special type of cyberattack that causes internet servers to be overwhelmed by many requests and garbage traffic, rendering the hosted sites and services inaccessible for legitimate visitors and users.
![Russian Hackers Exploiting Microsoft Follina Vulnerability Against Ukraine](/static/build/img/news/russian-hackers-exploiting-microsoft-follina-vulnerability-against-ukraine-small.jpg)
The Computer Emergency Response Team of Ukraine has cautioned of a new set of spear-phishing attacks exploiting the "Follina" flaw in the Windows operating system to deploy password-stealing malware. Attributing the intrusions to a Russian nation-state group tracked as APT28, the agency said the attacks commence with a lure document titled "Nuclear Terrorism A Very Real Threat.rtf" that, when opened, exploits the recently disclosed vulnerability to download and execute a malware called CredoMap.
![Russian govt hackers hit Ukraine with Cobalt Strike, CredoMap malware](/static/build/img/news/russian-govt-hackers-hit-ukraine-with-cobalt-strike-credomap-malware-small.jpg)
The Ukrainian Computer Emergency Response Team is warning that Russian hacking groups are exploiting the Follina code execution vulnerability in new phishing campaigns to install the CredoMap malware and Cobalt Strike beacons. The RTF document used in the APT28 campaign attempts to exploit CVE-2022-30190, aka "Follina," to download and launch the CredoMap malware on a target's device.
![Authorities Shut Down Russian RSOCKS Botnet That Hacked Millions of Devices](/static/build/img/news/authorities-shut-down-russian-rsocks-botnet-that-hacked-millions-of-devices-small.jpg)
The U.S. Department of Justice on Thursday disclosed that it took down the infrastructure associated with a Russian botnet known as RSOCKS in collaboration with law enforcement partners in Germany, the Netherlands, and the U.K. The botnet, operated by a sophisticated cybercrime organization, is believed to have ensnared millions of internet-connected devices, including Internet of Things devices, Android phones, and computers for use as a proxy service. "The RSOCKS botnet offered its clients access to IP addresses assigned to devices that had been hacked," the DoJ said in a press release.
![International operation takes down Russian RSOCKS botnet](/static/build/img/news/international-operation-takes-down-russian-rsocks-botnet-small.jpg)
A Russian operated botnet known as RSOCKS has been shut down by the US Department of Justice acting with law enforcement partners in Germany, the Netherlands and the UK. It is believed to have compromised millions of computers and other devices around the globe. The RSOCKS botnet functioned as an IP proxy service, but instead of offering legitimate IP addresses leased from internet service providers, it was providing criminals with access to the IP addresses of devices that had been compromised by malware, according to a statement from the US Attorney's Office in the Southern District of California.