China-linked TA416 expands espionage across Europe and Middle East
While some of TA416’s techniques, tactics and procedures remained unchanged, Proofpoint observed the group modifying its infection chains.
3 min read
Cybersecurity Help is a global vulnerability intelligence provider. We monitor vulnerabilities in software from 60,000+ vendors and help customers prevent potential data breaches by addressing them proactively.
Request DemoWhile some of TA416’s techniques, tactics and procedures remained unchanged, Proofpoint observed the group modifying its infection chains.
3 min readThe campaign combines social engineering with “living-off-the-land” techniques.
2 min readGoogle didn’t disclose any additional details regarding the nature of exploitation.
1 min readAs part of the breach, multiple AWS access keys were stolen and later used for unauthorized activity across a limited number of Cisco cloud accounts.
2 min readAttackers leveraged the update channel of TrueConf to deliver malware, more specifically a payload linked to the Havoc C&C framework.
2 min read