actors have been attributed to more than 51,000 malware samples and 1.1 million cyber attacks over the last four years as they are gaining experience quickly as they adopt new technologies, techniques, and malware to advance their schemes, according to a May 9 blog post.
SilverTerrier is not a traditional cybercrime group. It is the collective name Unit 42 of Palo Alto Networks gives to Nigerian cybercriminals. SilverTerrier continues to grow (over 400 individual actors) and evolve (from advance fee and 419 scams to business email compromise (BEC) and malware distribution).
Despite a doxing of its targets and tools in March, the advanced persistent threat group known as OilRig remains a significant threat to governments and businesses, researchers at Palo Alto Network's Unit 42 report.
Attackers are actively exploiting recently fixed vulnerabilities in Oracle WebLogic and the Widget Connector macro in Atlassian Confluence to deliver ransomware, mine cryptocurrency and make the compromised machines participate in DDoS attacks.
Earlier this month, a prolific hacking group said to be sponsored by Iran had its cyber arsenal leaked. A bundle of tools and target information belonging to the crew, dubbed OilRig, were thrown up on the web for all and sundry to see, marking the most significant leak of Iran's cyber weaponry to date.
With changing security landscape and increasing compute power and threat vectors, 5G security needs to embrace a holistic protection approach that includes not just the networks, but the end user and IoT devices. Learn about Palo Alto Networks' approach to 5G security with Scott Stevens, CTO for service providers at Palo Alto Networks.
Most businesses standardize on couple of server, network and storage vendors but are forced to use dozens of security vendors. Palo Alto Networks uses its platform security approach to enable partners to add their IP under the umbrella of a single provider.
Palo Alto Networks’ Unit 42 security division recently discovered malware that targets the Mac platform and enables hackers to steal browser cookies, or login credentials, associated with mainstream cryptocurrency exchanges and wallet service websites.