Creating an Insightful World
2k followers 0 articles/week
Despite Sanctions, North Koreans Continue to Use Foreign Technology

Summary:Insikt Group's recent analysis reveals that North Koreans continue to use foreign technology to access the internet despite heavy sanctions. This includes Apple, Samsung, and Huawei devices, as well as various social media platforms. A notable finding is the increased use of obfuscation services like VPNs and proxies to circumvent censorship...

Thu Jul 18, 2024 18:44
Security Challenges Rise as QR Code and AI-Generated Phishing Proliferate

SummaryBetween Q4 2023 and Q1 2024, cybercriminals increasingly used QR codes and AI-generated phishing tactics to target executives, exploiting AWS SNS for malicious SMS and VAST tags for malvertising. These sophisticated methods enable threat actors to bypass security measures, capture multi-factor authentication (MFA) tokens, and deceive users more...

Thu Jul 18, 2024 18:44
TAG-100 Uses Open-Source Tools in Suspected Global Espionage Campaign, Compromising Two Asia-Pacific Intergovernmental Bodies

SummaryRecorded Futures Insikt Group identified a suspected cyber-espionage campaign by TAG-100, targeting global government and private sector organizations. TAG-100 exploited internet-facing devices and used open-source tools like the Go backdoor Pantegana. The campaign compromised two Asia-Pacific intergovernmental organizations and targeted multiple...

Tue Jul 16, 2024 18:06
Hurdling Over Hazards: Multifaceted Threats to the Paris Olympics

The 2024 Paris Olympic Games face numerous threats due to their high-profile nature and international significance. Insikt Group's research identifies several key risks: cybercriminals targeting critical sectors with ransomware, hacktivists aiming to disrupt due to geopolitical conflicts, and state actors engaging in espionage and influence operations....

Tue Jul 9, 2024 16:44
GRU's BlueDelta Targets Key Networks in Europe with Multi-Phase Espionage Campaigns

Insikt Group tracks the evolutions of GRU's BlueDelta operational infrastructure, targeting networks across Europe with information-stealing Headlace malware and credential-harvesting web pages. BlueDelta deployed Headlace infrastructure in three distinct phases from April to December 2023, using phishing, compromised internet services, and living off...

Tue Jul 9, 2024 16:44
GitCaught: Threat Actor Leverages GitHub Repository for Malicious Infrastructure

In recent research, Recorded Future's Insikt Group uncovered a sophisticated cybercriminal campaign led by Russian-speaking threat actors from the Commonwealth of Independent States (CIS). These threat actors leveraged a GitHub profile to impersonate legitimate software applications like 1Password, Bartender 5, and Pixelmator Pro to distribute various...

Tue Jul 9, 2024 16:44

Build your own newsfeed

Ready to give it a go?
Start a 14-day trial, no credit card required.

Create account