Cyber Espionage & Strategic Web Compromises – Trusted Websites Serving...
By Steven Adair and Ned Moran In the last year, attackers engaged in cyber espionage have increasingly turned to the web to distribute their malware via drive-by exploits. The idea of distributing...
View ArticleComment Group Cyber Espionage: Additional Information & Clarification
The Comment Group – Long Term Cyber Espionage By Steven Adair A cyber espionage threat group, frequently known as the Comment Group, has recently received a good bit of extra attention in the last few...
View ArticleBreaking the Kill Chain with Log Analysis
By Ned Moran and Steven Adair At Shadowserver we have observed cyber threat actors use strategic web compromise as an avenue to infect high-value victims. In this context, we define a strategically...
View ArticleThe Italian Connection: An analysis of exploit supply chains and digital...
by Ned Moran and Ben Koehl On July 5, 2015 an unknown hacker publicly announced on Twitter that he had breached the internal network of Hacking Team – an Italian pentesting company known to purchase...
View Article
More Pages to Explore .....