• Menu
  • Skip to main content
  • Skip to primary sidebar

All Tech News

Latest Technology News

Pro-Russian Winter Vivern APT Targets Governments and Telecom Firm

You are here: Home / Cyber Security News / Pro-Russian Winter Vivern APT Targets Governments and Telecom Firm

The Russia-aligned innovative persistent menace (APT) regarded as Winter Vivern has been observed conducting espionage campaigns targeting governing administration organizations and a private telecommunication corporation.

Security scientists at SentinelOne shared specifics about the new campaign in an advisory posted on Thursday. The APT activity was 1st identified by DomainTools in early 2021 and then further more described by Lab52 months later.

“The group has averted community disclosure since then, till latest assaults targeting Ukraine,” wrote risk researcher Tom Hegel in the SentinelOne advisory. “A aspect of a Winter Vivern marketing campaign was claimed in recent months by the Polish CBZC, and then the Ukraine CERT as UAC-0114.”

In accordance to Hegel, Wintertime Vivern’s activity aligns with the global aims and pursuits of the Belarusian and Russian governments.

“Recently linked campaigns reveal that Wintertime Vivern has qualified Polish federal government companies, the Ukraine Ministry of International Affairs, the Italy Ministry of Foreign Affairs and people today within the Indian authorities,” reads the advisory. “Of distinct curiosity is the APT’s concentrating on of personal enterprises, like telecommunications businesses, that aid Ukraine in the ongoing war.”

Examine a lot more on Ukraine below: Cyber Threat Landscape Shaped by Ukraine Conflict, ENISA Report Reveals

Further, Hegel stated that Winter Vivern utilised practices personalized to the qualified business, to boost the probability of successful baiting through phishing and deployment of destructive paperwork.

“Winter Vivern’s strategies have incorporated the use of destructive files, often crafted from reliable governing administration paperwork publicly offered or customized to specific themes,” wrote the malware researcher. “More a short while ago, the group has used a new lure procedure that includes mimicking authorities domains to distribute malicious downloads.”

Because of this capability to lure targets into the assaults, the SentinelOne crew believes the APT to be a “formidable force” in the cyber area.

“Their ability to lure targets into the assaults and their targeting of governments and superior-worth personal corporations reveal the amount of sophistication and strategic intent in their functions,” Hegel wrote.

The SentinelOne advisory will come times soon after security authorities famous how Russia’s cyber strategies in Ukraine were observed shifting to focus on espionage.

Some parts of this article are sourced from:
www.infosecurity-journal.com

Previous Post: « Telegram, WhatsApp Trojanized to Target Cryptocurrency Wallets

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Recent Posts

  • Pro-Russian Winter Vivern APT Targets Governments and Telecom Firm
  • Telegram, WhatsApp Trojanized to Target Cryptocurrency Wallets
  • Google Exposes 18 Zero-Day Flaws in Samsung Exynos Chips
  • THN Webinar: 3 Research-Backed Ways to Secure Your Identity Perimeter
  • New GoLang-Based HinataBot Exploiting Router and Server Flaws for DDoS Attacks

Copyright © 2023 · AllTech.News, All Rights Reserved.