Notorious threat actors like Potao Express, BlackEnergy and Turla account for as many as 79 unique malware families that have been used to infiltrate European government and military computers and target “high-value” entities across Ukraine, Russia, Georgia, and Belarus for information harvesting. The findings come from a map put together by Check Point Research and genetic malware analysis firm Intezer, making it first-ever comprehensive analysis of state-backed Russian-attributed threat groups that have been found to engage in disruptive, cutting-edge cyber warfare. “The size of the resource investment and the way the Russians are organizing themselves in silos makes them able to carry…
This story continues at The Next Web
More Stories
Will County, Illinois 1864 Map – May 20, 2023 at 04:14AM
This kid on Google Map trying to get by – April 27, 2023 at 05:05PM
World of Hyatt: Complete list of all-inclusive properties in Europe (with map) – April 27, 2023 at 04:57PM