![]() The researchers found evidence that in June the group carried out several successful intrusions into Russian-speaking organizations, which were discovered only after the attackers already had full access to the entire network, including the domain controller. The documents are usually crafted for a particular target, which makes them almost undetectable. The group uses so-called template injection attacks that abuse features in Microsoft Word to deliver malicious payloads to victims. It is not yet clear who is behind the group.Ĭloud Atlas has stuck with its “simple but effective” methods, which haven’t changed over time, according to Check Point. The goals of the group are espionage and theft of confidential information, according to researchers from Positive Technologies. The group has been active since 2014, according to research published by Check Point last week, but since the outbreak of the war in Ukraine it has mainly attacked “high profile victims” in Russia, Belarus, Transnistria (a pro-Kremlin breakaway region of Moldova), and Russian-annexed territories of Ukraine, including Crimea, Luhansk, and Donetsk. ![]() ![]() The cyber-espionage group Cloud Atlas has ramped up activities targeting Russia, Belarus and disputed parts of Ukraine and Moldova since Russia’s invasion this year, according to a new report. Cyber-espionage group Cloud Atlas targets Russia and its supporters ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |