id
int64
1
14.4k
text
stringlengths
3
5.01k
entities
list
relations
list
Comments
list
13,005
The targets, primarily located in Lithuania, were sent links to attacker controlled domains from a domain spoofing the Facebook security team.
[ { "id": 48804, "label": "location", "start_offset": 34, "end_offset": 43 }, { "id": 48805, "label": "SOFTWARE", "start_offset": 119, "end_offset": 128 } ]
[]
[]
13,006
Recently observed Ghostwriter credential phishing domains and emails: Curious Gorge, a group TAG attributes to China's PLA SSF, has remained active against government, military, logistics and manufacturing organizations in Ukraine, Russia and Central Asia.
[ { "id": 48807, "label": "location", "start_offset": 243, "end_offset": 255 }, { "id": 48810, "label": "threat-actor", "start_offset": 70, "end_offset": 83 }, { "id": 48811, "label": "location", "start_offset": 111, "end_offset": 119 }, { "id": 48809, "label": "location", "start_offset": 232, "end_offset": 239 }, { "id": 48808, "label": "location", "start_offset": 223, "end_offset": 230 }, { "id": 48813, "label": "location", "start_offset": 119, "end_offset": 126 }, { "id": 48812, "label": "identity", "start_offset": 119, "end_offset": 126 }, { "id": 40519, "label": "threat-actor", "start_offset": 18, "end_offset": 29 }, { "id": 40520, "label": "attack-pattern", "start_offset": 41, "end_offset": 49 } ]
[ { "id": 466, "from_id": 48810, "to_id": 48812, "type": "attributed-to" } ]
[]
13,007
In Russia, long running campaigns against multiple government organizations have continued, including the Ministry of Foreign Affairs.
[ { "id": 48814, "label": "location", "start_offset": 3, "end_offset": 9 }, { "id": 48815, "label": "identity", "start_offset": 106, "end_offset": 133 } ]
[]
[]
13,008
Over the past week, TAG identified additional compromises impacting multiple Russian defense contractors and manufacturers and a Russian logistics company.
[ { "id": 48819, "label": "location", "start_offset": 129, "end_offset": 137 }, { "id": 48817, "label": "location", "start_offset": 77, "end_offset": 85 }, { "id": 48820, "label": "identity", "start_offset": 20, "end_offset": 24 } ]
[]
[]
13,009
Upon discovery, all identified websites and domains were added to Safe Browsing to protect users from further exploitation.
[]
[]
[]
13,010
We also send all targeted Gmail and Workspace users government-backed attacker alerts notifying them of the activity.
[ { "id": 48821, "label": "SOFTWARE", "start_offset": 26, "end_offset": 32 } ]
[]
[]
13,011
We encourage any potential targets to enable Google Account Level Enhanced Safe Browsing and ensure that all devices are updated.
[]
[]
[]
13,012
The team continues to work around the clock, focusing on the safety and security of our users and the platforms that help them access and share important information.
[]
[]
[]
13,013
We’ll continue to take action, identify bad actors and share relevant information with others across industry and governments, with the goal of bringing awareness to these issues, protecting users and preventing future attacks.
[]
[]
[]
13,015
In early March, Google’s Threat Analysis Group (TAG) published an update on the cyber activity it was tracking with regard to the war in Ukraine.
[ { "id": 48825, "label": "identity", "start_offset": 25, "end_offset": 52 }, { "id": 48827, "label": "TIME", "start_offset": 3, "end_offset": 14 }, { "id": 48826, "label": "location", "start_offset": 137, "end_offset": 144 } ]
[]
[]
13,016
Since our last update, TAG has observed a continuously growing number of threat actors using the war as a lure in phishing and malware campaigns.
[ { "id": 48828, "label": "identity", "start_offset": 23, "end_offset": 27 } ]
[]
[]
13,018
Financially motivated and criminal actors are also using current events as a means for targeting users.
[]
[]
[]
13,020
TAG has also continued to observe multiple ransomware brokers continuing to operate in a business as usual sense.
[ { "id": 48838, "label": "identity", "start_offset": 0, "end_offset": 4 } ]
[]
[]
13,021
As always, we continue to publish details surrounding the actions we take against coordinated influence operations in our quarterly TAG bulletin.
[]
[]
[]
13,022
We promptly identify and remove any such content, but have not observed any significant shifts from the normal levels of activity that occur in the region.
[]
[]
[]
13,023
Here is a deeper look at the campaign activity TAG has observed over the past two weeks: Curious Gorge, a group TAG attributes to China's PLA SSF, has conducted campaigns against government and military organizations in Ukraine, Russia, Kazakhstan, and Mongolia.
[ { "id": 48841, "label": "identity", "start_offset": 130, "end_offset": 145 }, { "id": 48843, "label": "location", "start_offset": 220, "end_offset": 227 }, { "id": 48840, "label": "threat-actor", "start_offset": 89, "end_offset": 102 }, { "id": 48842, "label": "identity", "start_offset": 112, "end_offset": 116 }, { "id": 48845, "label": "location", "start_offset": 237, "end_offset": 247 }, { "id": 48839, "label": "identity", "start_offset": 47, "end_offset": 51 }, { "id": 48844, "label": "location", "start_offset": 229, "end_offset": 235 }, { "id": 48846, "label": "location", "start_offset": 253, "end_offset": 261 } ]
[ { "id": 467, "from_id": 48840, "to_id": 48841, "type": "attributed-to" }, { "id": 468, "from_id": 48840, "to_id": 48843, "type": "duplicate-of" }, { "id": 469, "from_id": 48840, "to_id": 48844, "type": "duplicate-of" }, { "id": 470, "from_id": 48840, "to_id": 48845, "type": "duplicate-of" }, { "id": 471, "from_id": 48840, "to_id": 48846, "type": "duplicate-of" } ]
[]
13,024
While this activity largely does not impact Google products, we remain engaged and are providing notifications to victim organizations.
[ { "id": 48847, "label": "SOFTWARE", "start_offset": 44, "end_offset": 51 } ]
[]
[]
13,025
Recently observed IPs used in Curious Gorge campaigns: COLDRIVER, a Russian-based threat actor sometimes referred to as Calisto, has launched credential phishing campaigns, targeting several US based NGOs and think tanks, the military of a Balkans country, and a Ukraine based defense contractor.
[ { "id": 48848, "label": "threat-actor", "start_offset": 30, "end_offset": 43 }, { "id": 48849, "label": "campaign", "start_offset": 55, "end_offset": 64 }, { "id": 48853, "label": "location", "start_offset": 240, "end_offset": 255 }, { "id": 48854, "label": "location", "start_offset": 263, "end_offset": 271 }, { "id": 48855, "label": "identity", "start_offset": 277, "end_offset": 295 }, { "id": 48856, "label": "identity", "start_offset": 200, "end_offset": 205 }, { "id": 48857, "label": "identity", "start_offset": 209, "end_offset": 220 }, { "id": 48858, "label": "location", "start_offset": 191, "end_offset": 194 }, { "id": 48850, "label": "threat-actor", "start_offset": 120, "end_offset": 127 }, { "id": 48851, "label": "attack-pattern", "start_offset": 142, "end_offset": 161 }, { "id": 48859, "label": "identity", "start_offset": 226, "end_offset": 235 } ]
[ { "id": 473, "from_id": 48859, "to_id": 48853, "type": "located-at" }, { "id": 474, "from_id": 48856, "to_id": 48858, "type": "located-at" }, { "id": 475, "from_id": 48857, "to_id": 48858, "type": "located-at" }, { "id": 472, "from_id": 48855, "to_id": 48854, "type": "located-at" }, { "id": 476, "from_id": 48850, "to_id": 48851, "type": "uses" }, { "id": 477, "from_id": 48850, "to_id": 48856, "type": "duplicate-of" }, { "id": 478, "from_id": 48850, "to_id": 48857, "type": "duplicate-of" }, { "id": 479, "from_id": 48850, "to_id": 48859, "type": "duplicate-of" }, { "id": 480, "from_id": 48850, "to_id": 48855, "type": "duplicate-of" }, { "id": 481, "from_id": 48850, "to_id": 48849, "type": "related-to" } ]
[]
13,026
However, for the first time, TAG has observed COLDRIVER campaigns targeting the military of multiple Eastern European countries, as well as a NATO Centre of Excellence.
[ { "id": 48860, "label": "campaign", "start_offset": 46, "end_offset": 56 }, { "id": 48861, "label": "identity", "start_offset": 80, "end_offset": 89 }, { "id": 48862, "label": "identity", "start_offset": 142, "end_offset": 167 }, { "id": 48863, "label": "location", "start_offset": 101, "end_offset": 117 } ]
[ { "id": 482, "from_id": 48861, "to_id": 48863, "type": "located-at" }, { "id": 484, "from_id": 48860, "to_id": 48862, "type": "targets" }, { "id": 483, "from_id": 48860, "to_id": 48861, "type": "targets" } ]
[]
13,027
These campaigns were sent using newly created Gmail accounts to non-Google accounts, so the success rate of these campaigns is unknown.
[ { "id": 48864, "label": "SOFTWARE", "start_offset": 46, "end_offset": 52 } ]
[]
[]
13,028
We have not observed any Gmail accounts successfully compromised during these campaigns.
[ { "id": 48865, "label": "SOFTWARE", "start_offset": 25, "end_offset": 31 } ]
[]
[]
13,029
Recently observed COLDRIVER credential phishing domains: Ghostwriter, a Belarusian threat actor, recently introduced a new capability into their credential phishing campaigns.
[ { "id": 48866, "label": "campaign", "start_offset": 18, "end_offset": 28 }, { "id": 48867, "label": "attack-pattern", "start_offset": 28, "end_offset": 48 }, { "id": 48868, "label": "threat-actor", "start_offset": 57, "end_offset": 68 }, { "id": 48869, "label": "location", "start_offset": 72, "end_offset": 83 }, { "id": 48870, "label": "attack-pattern", "start_offset": 145, "end_offset": 164 } ]
[ { "id": 485, "from_id": 48866, "to_id": 48867, "type": "uses" } ]
[]
13,030
In mid-March, a security researcher released a blog post detailing a 'Browser in the Browser' phishing technique.
[ { "id": 48871, "label": "attack-pattern", "start_offset": 69, "end_offset": 102 }, { "id": 48872, "label": "TIME", "start_offset": 3, "end_offset": 12 } ]
[]
[]
13,031
While TAG has previously observed this technique being used by multiple government-backed actors, the media picked up on this blog post, publishing several stories highlighting this phishing capability.
[ { "id": 48873, "label": "identity", "start_offset": 6, "end_offset": 10 }, { "id": 48874, "label": "attack-pattern", "start_offset": 182, "end_offset": 191 } ]
[]
[]
13,032
Ghostwriter actors have quickly adopted this new technique, combining it with a previously observed technique, hosting credential phishing landing pages on compromised sites.
[ { "id": 40646, "label": "threat-actor", "start_offset": 0, "end_offset": 11 }, { "id": 40647, "label": "attack-pattern", "start_offset": 130, "end_offset": 138 } ]
[]
[]
13,033
The new technique, displayed below, draws a login page that appears to be on the passport.i.ua domain, overtop of the page hosted on the compromised site.
[]
[]
[]
13,034
Once a user provides credentials in the dialog, they are posted to an attacker controlled domain.
[]
[]
[]
13,035
Recently observed Ghostwriter credential phishing domains:
[ { "id": 48875, "label": "threat-actor", "start_offset": 18, "end_offset": 30 }, { "id": 40655, "label": "attack-pattern", "start_offset": 41, "end_offset": 49 } ]
[]
[]
13,036
The team continues to work around the clock, focusing on the safety and security of our users and the platforms that help them access and share important information.
[]
[]
[]
13,037
We’ll continue to take action, identify bad actors and share relevant information with others across industry and governments, with the goal of bringing awareness to these issues, protecting users and preventing future attacks.
[]
[]
[]
13,039
Welcome to our weekly roundup, where we share what you need to know about cybersecurity news and events that happened over the past few days.
[]
[]
[]
13,040
This week, learn about Trend Micro’s latest cloud security offering, Cloud One – Application Security.
[ { "id": 48878, "label": "identity", "start_offset": 23, "end_offset": 35 }, { "id": 48879, "label": "SOFTWARE", "start_offset": 69, "end_offset": 101 } ]
[]
[]
13,042
Read on:
[]
[]
[]
13,043
Leading Protection for Cloud-Based Applications from Trend Micro Trend Micro announced the availability of its Trend Micro Cloud One – Application Security, a cloud native security solution for modern applications and APIs.
[]
[]
[]
13,044
Delivered as part of its industry-leading platform, Cloud One – Application Security provides code-level visibility and protection against the latest cyber threats.
[]
[]
[]
13,046
The Internet of Things (IoT) Cybersecurity Improvement Act, passed by the House of Representatives in September and unanimously approved by the Senate last week, is a step toward warding off advanced threats and providing greater security in IoT devices.
[ { "id": 48882, "label": "identity", "start_offset": 74, "end_offset": 98 }, { "id": 48883, "label": "TIME", "start_offset": 102, "end_offset": 112 } ]
[]
[]
13,047
The act aims to create “standards and guidelines” for the federal government to follow with the hopes that the requirements also make their way into private sector manufacturing.
[]
[]
[]
13,048
Navigating Gray Clouds: The Importance of Visibility in Cloud Security
[]
[]
[]
13,049
With 85% of businesses worldwide using the cloud, it has proven its imperative value, especially during the onslaught of the COVID-19 pandemic when remote work and reliance on the cloud for automation and scalability is the norm.
[]
[]
[]
13,050
After migrating to the cloud, enterprises need to be aware of the visibility-related challenges and security risks associated with it.
[]
[]
[]
13,051
In this blog, Trend Micro shares security recommendations for organizations to ensure stable security practices in a cloud-first world.
[]
[]
[]
13,052
Apple Security Chief Maintains Innocence After Bribery Charges
[ { "id": 48884, "label": "identity", "start_offset": 0, "end_offset": 20 } ]
[]
[]
13,053
A grand jury in California's Santa Clara County has indicted Thomas Moyer, Apple's head of global security, for bribery.
[ { "id": 48887, "label": "identity", "start_offset": 61, "end_offset": 73 }, { "id": 48885, "label": "identity", "start_offset": 2, "end_offset": 12 }, { "id": 48886, "label": "location", "start_offset": 16, "end_offset": 47 } ]
[]
[]
13,054
Moyer is accused of offering 200 iPads to the Santa County Sheriff's office in exchange for concealed carry permits for four Apple employees.
[]
[]
[]
13,055
Weaponizing Open Source Software for Targeted Attacks
[]
[]
[]
13,056
In this blog, Trend Micro researchers walk through a recent investigation that involved trojanized open-source software, which is tricky to spot because it takes on the façade of legitimate, non-malicious software, making it especially stealthy and useful for targeted attacks.
[]
[]
[]
13,057
However, a closer investigation can reveal suspicious behavior that exposes their malicious intent.
[]
[]
[]
13,058
Botnets Have Been Silently Mass-Scanning the Internet for Unsecured ENV Files Security firm Greynoise found that multiple threat actors, while drawing little attention to themselves, have spent the past two to three years mass-scanning the internet for ENV (environment) files that were accidentally uploaded and left exposed on web servers.
[]
[]
[]
13,059
Frameworks like Docker, Node.js, Symfony, and Django use ENV files to store environment variables such as API tokens, passwords and database logins.
[ { "id": 48891, "label": "SOFTWARE", "start_offset": 46, "end_offset": 53 }, { "id": 48889, "label": "SOFTWARE", "start_offset": 24, "end_offset": 31 }, { "id": 48888, "label": "SOFTWARE", "start_offset": 16, "end_offset": 22 }, { "id": 48890, "label": "SOFTWARE", "start_offset": 33, "end_offset": 40 } ]
[]
[]
13,060
Analysis of Kinsing Malware's Use of Rootkit
[ { "id": 48892, "label": "malware", "start_offset": 12, "end_offset": 29 }, { "id": 40769, "label": "attack-pattern", "start_offset": 37, "end_offset": 44 } ]
[]
[]
13,061
With the constant evolution of shell scripts and Linux-based malicious backdoors and agents, it’s not surprising that the creators of Kinsing have kept in step.
[ { "id": 48893, "label": "malware", "start_offset": 134, "end_offset": 142 } ]
[]
[]
13,062
In this blog post Trend Micro researchers discuss the malware variant’s current capabilities, including the addition of features intended to make it more difficult to detect in infected machines.
[]
[]
[]
13,063
The Malware that Usually Installs Ransomware and You Need to Remove Right Away
[]
[]
[]
13,064
This article lists the known malware strains that have been used over the past two years to install ransomware, all of which should serve as a "code red" moment for any organization.
[]
[]
[]
13,065
Once any of these malware strains are detected, system administrators should drop everything, take systems offline, and audit and remove the malware as a top priority.
[]
[]
[]
13,066
Published New White Paper: Practical Risk Assessments for Smart Factories
[]
[]
[]
13,067
While cyberattacks that threaten smart factories cannot be ignored, it can be a struggle to decipher which security method is sufficient within your organization’s specific system, as well as where to start.
[]
[]
[]
13,068
To design a secure system, risk assessment is required.
[]
[]
[]
13,069
This new white paper is intended to simulate risk assessment practices using an example of a fictitious smart factory.
[]
[]
[]
13,070
The risk assessment described in this document aims to assess and prioritize the risks of the entire smart factory environment, including IT.
[]
[]
[]
13,071
Post-Breach, Peatix Data Reportedly Found on Instagram, Telegram
[ { "id": 48894, "label": "SOFTWARE", "start_offset": 45, "end_offset": 54 }, { "id": 48895, "label": "SOFTWARE", "start_offset": 56, "end_offset": 64 } ]
[]
[]
13,072
In a data breach notice to affected users, events application Peatix said it learned that user account data had been improperly accessed.
[]
[]
[]
13,073
Upon further investigation, they found that usernames, email addresses, salted and hashed passwords, nicknames, preferred languages, countries and time zones had been compromised.
[]
[]
[]
13,074
It’s unclear how many of its 5 million user base were affected or how the breach happened.
[]
[]
[]
13,075
Not long after the breach occurred, the compromised data was spotted on ads posted on Instagram stories, Telegram channels and various hacking forums.
[ { "id": 48896, "label": "SOFTWARE", "start_offset": 86, "end_offset": 96 }, { "id": 48897, "label": "SOFTWARE", "start_offset": 105, "end_offset": 114 } ]
[]
[]
13,076
How a Ransomware Attack Could Affect Retailers
[]
[]
[]
13,077
Cybercriminals have recently been focusing their efforts on the retail industry, launching ransomware-based attacks that could prove disastrous for businesses if it disrupts their operations during important shopping seasons.
[]
[]
[]
13,078
A ransomware attack on a retailer could mean thousands of lost sales opportunities in the short-term, and serious damage to reputation in the long-term.
[]
[]
[]
13,079
Perception of an “unsafe” business could turn customers towards competitors who can offer a better and more secure shopping experience.
[]
[]
[]
13,080
What are your thoughts on the ransomware attacks on retailers as we approach the busiest times of the year for retailers, including Black Friday, Cyber Monday and the holiday season?
[]
[]
[]
13,081
Share them in the comments below or follow me on Twitter to continue the conversation: @JonLClay.
[ { "id": 48898, "label": "SOFTWARE", "start_offset": 49, "end_offset": 57 } ]
[]
[]
13,082
Tags Cloud | Malware | Expert Perspective | APT & Targeted Attacks | IoT | Ransomware |
[]
[]
[]
13,083
Articles, News, Reports
[]
[]
[]
13,084
One of the secrets of Trend Micro’s long-lasting success is being constantly on the lookout for where the next security threats might come from.
[ { "id": 48899, "label": "identity", "start_offset": 22, "end_offset": 33 } ]
[]
[]
13,085
That’s why we’re focusing a great deal of our research and development efforts right now on the intersection of IT and operational technology (OT).
[]
[]
[]
13,086
This burgeoning world of connected IoT devices is particularly advanced in the manufacturing space, where huge gains are already being made.
[]
[]
[]
13,087
But as great as these leaps forward are, so are the risks if technology systems aren’t properly secured.
[]
[]
[]
13,088
That’s why we’re thrilled to be joining the ROS-Industrial Consortium (ROS-I) to help accelerate the secure development of robotic Industry 4.0 applications.
[]
[]
[]
13,089
It’s yet another important step for our stated mission: to secure the connected world.
[]
[]
[]
13,090
Why IIoT matters Industrial IoT (IIoT) systems are already streamlining production processes, improving cost efficiencies, and helping to drive greater agility and innovation for manufacturers.
[]
[]
[]
13,091
It’s no coincidence that the global market for such solutions will grow at nearly 17% CAGR over the next six years to exceed $263 billion by 2027.
[]
[]
[]
13,092
But with new technology always comes new cyber risk.
[]
[]
[]
13,093
As connectivity is introduced to industrial computing devices, the challenge is managing the threat from remote attackers.
[]
[]
[]
13,094
System and software vulnerabilities could be probed to hijack devices, sabotage production processes and steal intellectual property.
[]
[]
[]
13,095
Robots are a particular risk—not only because so much of modern manufacturing relies on them, but also because many of these machines rely on legacy technology dating back decades.
[]
[]
[]
13,096
These custom, proprietary programming languages and unique ecosystems can make security complex, and lead to unpatched vulnerabilities which sophisticated attackers could exploit, with serious consequences.
[]
[]
[]
13,097
Shaping the roadmap ROS-I is an open-source project devoted to extending the capabilities of the Robot Operating Systems (ROS) into industrial hardware and applications.
[]
[]
[]
13,098
The job of the ROS-I Consortium is to prioritize these capabilities, offer code quality standards and provide technical support and training.
[]
[]
[]
13,099
As an associate member of the consortium, Trend Micro will now be able to participate in technical and strategic projects and help to shape the ROS-I roadmap.
[]
[]
[]
13,100
In fact, we’ve already demonstrated our value to the organization in research last year, which uncovered design flaws and vulnerabilities in legacy programming languages used by some of its products.
[]
[]
[]
13,101
That resulted in our collaboration to develop secure network guidelines for industrial robots using ROS.
[]
[]
[]
13,102
Securing the future Trend Micro also recently started looking at the security of the Data Distribution Service (DDS).
[]
[]
[]
13,103
This protocol is used heavily by ROS2 and will therefore be another area in which we hope to deliver tremendous value to ROS-I and end-customers going forward.
[]
[]
[]
13,104
Trend Micro is in many ways an unusual member of the consortium.
[]
[]
[]
13,105
Most either use ROS/ROS2 in their products, for example as robot manufacturers, or they want to help develop the software.
[]
[]
[]
13,106
We do neither, but we plan to work with the consortium to enhance security-by-design in ROS-I software.
[]
[]
[]
13,107
In fact, Trend Micro is only the second cybersecurity specialist to join.
[]
[]
[]
13,108
Securing IIoT systems is hard: it requires capabilities across the cloud, the network, and the devices themselves.
[]
[]
[]
13,111
For more info, check out our Smart Factory solutions: https://www.trendmicro.com/en_us/business/solutions/iot/smart-factory.html.
[ { "id": 40909, "label": "URL", "start_offset": 54, "end_offset": 128 } ]
[]
[]
13,112
Tags APT & Targeted Attacks | IoT | Expert Perspective | Articles, News, Reports
[]
[]
[]