Logo
Hamburger Menu Icon
Yoroi Background

Tag: cyberespionage

APT or not APT? What's Behind the Aggah Campaign

Introduction During our threat monitoring activities, we discovered an interesting drop chain related to the well-known Aggah campaign, the ambiguous infection chain observed by Unit42 which seemed to deliver payloads potentially associated with the Gorgon Group APT. After that, we discovered other malicious activities using the same TTPs and infrastructures, for instance in “The Enigmatic […]

Read More

The Russian Shadow in Eastern Europe: A Month Later

Introduction The Gamaredon attacks against Ukraine doesn't seem to have stopped. After a month since our last report we spotted a new suspicious email potentially linked to the Gamaredon group. The group was first discovered by Symantec and TrendMicro in 2015 but evidence of its activities has been dated back to 2013. During recent times, […]

Read More

Yoroi Cyber Security Annual Report 2018

In 2018 cyber-security experts observed an increased number of cyber attacks, malware endure to be the most aggressive and pervasive threat. For this reason, analyzing the last year occurred events would help cyber-security professionals to prevent further attacks during the next few months. In many cases the attacks reached a very high sophistication levels, both […]

Read More

The Russian Shadow in Eastern Europe: Ukrainian MOD Campaign.

Introduction Few days after the publication of our technical article related to the evidence of possible APT28 interference in the Ukrainian elections, we spotted another signal of a sneakier on-going operation. This campaign, instead, seems to be linked to another Russian hacking group: Gamaredon.  The Gamaredon APT was first spotted in 2013 and in 2015, […]

Read More

APT28 and Upcoming Elections: Evidence of Possible Interference (Part II)

Introduction The uncertain attribution of the Ukrainian themed malicious document discussed in our past article “APT28 and Upcoming Elections: Possible Interference Signals”, led us to a review of Sofacy’s phishing techniques to confirm or deny the possible involvement of Russian state-sponsored actors in the election interference. We ended up in an old fake Hotel reservation […]

Read More

APT28 and Upcoming Elections: evidence of possible interference

Introduction In mid-March, a suspicious Office document referencing the Ukraine elections appeared in the wild. This file was uncommon, it seemed carefully prepared and was speaking about who is leading in the elections polls, arguing about the life of the favorite candidate, Volodymyr Zelenskiy, who is defined Servant of the People, along with a strong […]

Read More

The Arsenal Behind the Australian Parliament Hack

Introduction In the past days, an infamous cyber attack targeted an high profile target on the APAC area: the Australian Parliament House. As reported by the Australian prime minister there was no evidence of any information theft and the attack has been promptly isolated and contained by the Australian Cyber Security Centre (ACSC), however the […]

Read More

New “Cozy Bear” campaign, old habits

Introduction The researchers of the Yoroi-Cybaze ZLab, on 16 November, accessed to a new APT29’s dangerous malware used for the recent attacks against many important US entities, such as military agencies, law enforcement, defense contractors, media companies and pharmaceutical companies.   The Russian group spread the malware through a spear phishing attacks impersonating a State Department […]

Read More

Hunting for Sofacy: Lojax Double-Agent Analysis

Introduction A new variant of the infamous APT28 Lojax (aka Double-Agent) has been discovered by the Yoroi-Cybaze ZLab researchers. It is the latest version of the well-known rootkit Double-Agent, previously analyzed by ESET researchers. The behavior of the Lojax sample seems to be similar to the previous versions and exploits the legitimate “Absolute Lojack” software […]

Read More

The “MartyMcFly” investigation: anchors-chain case

Background On October 17th we disclosed the “MartyMcFly” Threat (Rif. Analysis) where unknown attackers were targeting Italian naval industries. The analysis was cited by  Kaspersky’s ICS CERT who exposed a wider threat extension across multiple countries such as: Germany, Spain, and India. Thanks to Kaspersky’s extended analysis we decided to harvest more indicators and to […]

Read More

Cyber-Espionage Campaign Targeting the Naval Industry (“MartyMcFly”)

Background During the last week Yoroi CERT’s analysts uncovered several attacks targeting the italian naval and defence industry. The attacker used email as known propagation vector in order to infect victims by sending a special crafted xls file. The identified attack properties triggered internal defcon escalation in order to assess the threat magnitude and eventually special […]

Read More

Rilasciati strumenti di attacco Equation Group per ambienti Microsoft

  Proto: N060417. Con la presente Yoroi desidera informarLa che il gruppo hacker conosciuto con il nome di “Shadow Brokers” ha rilasciato al pubblico una nuova serie di strumenti di attacco informatico creati dalla NSA ed utilizzati in campagne di cyber-spionaggio in tutto il mondo. Quest’ultimo rilascio è legato al silenzio a seguito delle richieste […]

Read More
linkedin facebook pinterest youtube rss twitter instagram facebook-blank rss-blank linkedin-blank pinterest youtube twitter instagram