Cyber Espionage | Phishing Attacks | U.S.-China Relations APT41 hackers targeting US trade officials as talks with China approach
Cyber Espionage | Malware Delivery | Trade Negotiations Chinese agents reportedly posed as US congressman to transmit malware
Backdoor Techniques | Cyber Espionage | Malware MystRodX backdoor uses DNS and ICMP triggers for covert manipulation
Cyber Espionage | Geopolitical Tensions | Spear-Phishing Campaigns Iranian cybercriminals compromise over 100 diplomatic email accounts
Cyber Espionage | Malware Distribution | Targeted Attacks Abandoned Sogou Zhuyin update server compromised and repurposed for Taiwan espionage operation
Cloud Security Threats | Cyber Espionage | Vulnerability Exploitation Chinese hacker groups Murky, Genesis, and Glacial Panda targeting cloud computing and telecommunications
Cyber Espionage | Malware Delivery | Spear-Phishing Attacks North Korean hackers target diplomats via GitHub spearphishing attack
Credential Theft | Cyber Espionage | Malware Persistence New APT group ‘Curly COMrades’ targeting Georgia and Moldova
Cyber Espionage | Malware Techniques | Social Engineering Kimsuky APT hackers are utilizing LNK files as a means to deploy reflective malware, successfully evading detection by Windows Defender.