🚨📱 Android spyware news from SentinelLabs 🚨 We have identified four CapraRAT weaponized Android applications (APK) in a new spyware campaign that expands targeting to include mobile gamers, TikTok fans, and weapons enthusiasts. We associate this activity with the suspected state-sponsored threat actor Transparent Tribe, active since at least 2016 with attacks against Indian government and military personnel. To learn more, read the full research report by Alex Delamotte: https://s1.ai/CapraMix
SentinelOne’s Post
More Relevant Posts
-
Building and growing teams and solutions that impact the future. Delivering exceptional customer experience. Driving change through innovation. Inspiring and coaching others to dream more and do more. Sharing W-Ezz-dom.
SentinelLabs associates this activity with the suspected state-sponsored threat actor Transparent Tribe, active since at least 2016 with attacks against Indian government and military personnel: #Sentinelone #SentinelLabs #cybersecurity #security #datasecurity #internetsecurity #networksecurity #identitysecurity #cloudsecurity #containersecurity #securityawareness #cybercrime #malware #cyberattacks #cyberdefence #ethicalhacking #EDR #NDR #XDR #AI #digitalsafe #cybersafe #Cloud #containers #kubernetes #infosec #hacking #privacy #cyberdeception #deceptiontechnology
🚨📱 Android spyware news from SentinelLabs 🚨 We have identified four CapraRAT weaponized Android applications (APK) in a new spyware campaign that expands targeting to include mobile gamers, TikTok fans, and weapons enthusiasts. We associate this activity with the suspected state-sponsored threat actor Transparent Tribe, active since at least 2016 with attacks against Indian government and military personnel. To learn more, read the full research report by Alex Delamotte: https://s1.ai/CapraMix
To view or add a comment, sign in
-
🚨 Android Alert 📱 SentinelLabs has uncovered a new spyware threat targeting mobile gamers, TikTok enthusiasts, and weapons enthusiasts through four dangerous apps. We associate this activity with the suspected state-sponsored threat actor Transparent Tribe, active since at least 2016 with attacks against Indian government and military personnel. For all the details, read the full report by Alex Delamotte: https://s1.ai/CapraMix
CapraTube Remix | Transparent Tribe’s Android Spyware Targeting Gamers, Weapons Enthusiasts
To view or add a comment, sign in
-
Govt Issues Warning on 12 New Obscene Chat Apps The government has issued a warning about 12 new obscene chat apps, citing national security concerns. Allegedly utilized by Hostile Intelligence Agencies, these apps pose espionage threats, targeting both civilian and military personnel. The advisory urges immediate action and outlines precautionary measures against cyber threats. #obscenechat #Govt #Warning To read more click on link below in the comment
To view or add a comment, sign in
-
-
Russian cyber operators successfully hacked elements of the Ukrainian power system. They were inside for 2 months, undetected. They managed to CUT OFF THE POWER wartime realities. Again. With a cyberattack. That would normally be A HUGE EVENT. But kinetic strikes dwarf it so it becomes a footnote of this war. #cyberattack #ics #cyberoperation #cyberwar #cyberwarfare https://lnkd.in/dnFAU4aY
To view or add a comment, sign in
-
Expert in Public International Law Research | Humanitarian & Human Rights Enthusiast | Senior Lecturer | Lawyer | Compliance Subject Matter Expert.
Hacktivists/civilian hackers and their activities during armed conflicts (instead of war) are crucial topics. Additionally, one of the most important areas that requires revision pertains to 'Direct Participation in Hostilities,' particularly the criteria of direct causation and belligerent nexus when it comes to cyber operations in an armed conflict.
International lawyer & writer working on international humanitarian law, cyber operations, NSAGs and detention. Author of #OrganizingRebellion
Hacktivism in armed conflict has taken unprecedented levels. Mauro Vignati and I have pulled together 8 IHL-based rules that all hackers must respect, and recall 4 obligations of states to restrain them. No doubt: Cyber ops in war have limits – even hacktivists must them. Do not - attack civilian objects - attacks indiscriminately - harm civilians - harm medical and humanitarian facilities - harm indispensable objects & dangerous forces - spread terror https://t.co/SDDxkmLnbu
To view or add a comment, sign in
-
International lawyer & writer working on international humanitarian law, cyber operations, NSAGs and detention. Author of #OrganizingRebellion
Hacktivism in armed conflict has taken unprecedented levels. Mauro Vignati and I have pulled together 8 IHL-based rules that all hackers must respect, and recall 4 obligations of states to restrain them. No doubt: Cyber ops in war have limits – even hacktivists must them. Do not - attack civilian objects - attacks indiscriminately - harm civilians - harm medical and humanitarian facilities - harm indispensable objects & dangerous forces - spread terror https://t.co/SDDxkmLnbu
8 rules for “civilian hackers” during war, and 4 obligations for states to restrain them
ejiltalk.org
To view or add a comment, sign in
-
Founder UK & CEO of Azured | Experts in cloud security across Azure and Microsoft 365. Microsoft Solutions Partner.
Earlier this year, a US airman pleaded guilty to leaking classified military documents to a group on messaging app, Discord – in one of the most serious US national security breaches in years. So where did it all go wrong? And if the US military can’t get it right, is there really any hope for the rest of us? Yes. Absolutely, yes. 🧐 🎩 Our top six ways to reduce malicious insider threat is now live on the blog: https://hubs.la/Q02pDfwW0 #CloudSecurity #InsiderThreat #MicrosoftSecurity #CyberThreat #CyberAttack #RBAC #Copilot #DataSecurity #DataCompliance #ZeroTrust #PrivilegedIdentityManagement
How to reduce insider threat in the cloud.
To view or add a comment, sign in
-
How do attackers destroy your "sensitive data"? Secure your system by understanding these 7 points - 1. Reconnaissance 2. Weaponization 3. Delivery 4. Exploitation 5. Installation 6. Command and control 7. Destruction P.S. Do you use antivirus on your system? Save this and Reshare in your network #cyberattack #dataprotection
To view or add a comment, sign in
-
-
Last month, the Ministry of Defence experienced a large-scale cyber attack through third-party provider Shared Services Connected LTD (SSCL), compromising the personal data of an estimated 250,000 army personnel. At Barings Law, we understand the impact this breach has had on those affected. In response, we have launched a compensation claim for victims of the breach, with many of those feeling let down and uncertain about their futures, particularly those with high-security clearance positions who now fear the loss of their jobs and personal safety. For further information about the breach and the action we are taking on behalf of those affected, read our latest press release: https://lnkd.in/dyZnjczw #MinistryofDefence #DataBreach #CyberAttack #LawNews #TechNews
To view or add a comment, sign in
-
-
👀 Another interesting campaign from the Securonix Threat Research team which was observed targeting the Ukrainian military, this time using a crafty file-less PowerShell backdoor (SUBTLE-PAWS). The malware injects itself directly into the Windows registry as unique registry values saved directly into HKCU\System where each value contains a separate #PowerShell function. Also, interestingly enough, lateral movement is achieved only through USB infection/propagation tactics (malicious .lnk files). This is likely due to the fact that many of the devices used by the Ukrainian military are air-gapped using networks such as Starlink for internet connectivity. https://lnkd.in/dpN52nBK
To view or add a comment, sign in
-