logo
  • About
  • Contact
  • Instant Response
  • Hall of fame
  • COVID-19

Categories

  • Alerts and warnings
  • BU Safe
  • Hit by ransomware?
  • Incident handling
  • News

Noticed a problem?

Report an Incident
–or–

Recent Posts

  • The Shifting Landscape of Open Source Supply Chain Attacks – Part 3
  • Chinese PlugX Malware Hidden in Your USB Devices?
  • Ukraine’s Critical Sectors Targeted in Phishing Attack Surge
  • 3 business application security risks businesses need to prepare for in 2023
  • Google slays thousands of fake news vids posted by pro-China group Dragonbridge

Video

https://www.youtube.com/watch?v=wMsHDH67eb4

RSS NVD Data Feed

  • CVE-2022-42394 (pdf-xchange_editor) 26 January 2023
  • CVE-2022-42388 (pdf-xchange_editor) 26 January 2023
  • CVE-2022-42392 (pdf-xchange_editor) 26 January 2023
  • CVE-2022-42391 (pdf-xchange_editor) 26 January 2023
  • CVE-2022-42395 (pdf-xchange_editor) 26 January 2023

RSS CERT-EU News Feed

Information

  • Privacy & Cookies Policy

Iran-linked COBALT MIRAGE group uses ransomware in its operations

Posted on 13 May 2022

From securityaffairs.co

COBALT MIRAGE Iran

Researchers at Secureworks Counter Threat Unit (CTU) are investigating a series of attacks conducted by the Iran-linked COBALT MIRAGE APT group. The threat actors have been active since at least June 2020 and are linked to the Iranian COBALT ILLUSION group (aka APT35, Charming Kitten, PHOSPHOROUS and TunnelVision).

Read more…

Posted in News

Post navigation

Previous post: Iranian hackers behind highly targeted espionage campaign
Next post: Malware Builder Leverages Discord Webhooks
BU CERT
Authorized to use CERT(TM) - CERT is a mark owned by Carnegie
Mellon University

Other CERTs

  • National Cyber Security Centre
  • US-CERT
  • FORTHcert
Proudly powered by WordPress | Theme: bu-cert by Nan Jiang.