logo
  • About
  • Contact
  • Instant Response
  • Hall of fame
  • COVID-19

Categories

  • Alerts and warnings
  • BU Safe
  • Hit by ransomware?
  • Incident handling
  • News

Noticed a problem?

Report an Incident
–or–

Recent Posts

  • Millions of PC motherboards were sold with a firmware backdoor
  • Microsoft Details Critical Apple macOS Vulnerability Allowing SIP Protection Bypass
  • Evolving Threat Landscape of Hacktivism in Colombia
  • Alert: Hackers Exploit Barracuda Email Security Gateway 0-Day Flaw for 7 Months
  • The Transformative Power of Artificial Intelligence in Healthcare

Video

https://www.youtube.com/watch?v=wMsHDH67eb4

RSS NVD Data Feed

  • CVE-2023-33311 (contact_form_entries_-_contact_form_7_wpforms_and_more) 28 May 2023
  • CVE-2023-33332 (woocommerce_product_vendors) 28 May 2023
  • CVE-2023-28785 (yoast_seo) 28 May 2023
  • CVE-2023-33211 (wp-matomo_integration) 28 May 2023
  • CVE-2023-32800 (seo_pro) 28 May 2023

RSS CERT-EU News Feed

Information

  • Privacy & Cookies Policy

Another Ransomware in the Lazarus Arsenal

Posted on 6 August 2020

From cyware.com

Another Ransomware in the Lazarus Arsenal

According to research by Kaspersky, the North Korea-linked Lazarus APT group has been spotted using its own ransomware called VHD. The connection was established by researchers during the analysis of attacks conducted by Lazarus on businesses in Asia and France.   

Read more…

Posted in News

Post navigation

Previous post: iOS Extraction Without a Jailbreak: Full iOS 9 Support, Simplified File System Extraction
Next post: Hackers can abuse Microsoft Teams updater to deliver malicious payloads
BU CERT
Authorized to use CERT(TM) - CERT is a mark owned by Carnegie
Mellon University

Other CERTs

  • National Cyber Security Centre
  • US-CERT
  • FORTHcert
Proudly powered by WordPress | Theme: bu-cert by Nan Jiang.