fbpx
December 31, 2024

This map connects Russia’s deadly malware to the espionage groups behind them

russia-hack-hed-796x417.jpg
Notorious threat actors like Potao Express, BlackEnergy and Turla account for as many as 79 unique malware families that have been used to infiltrate European government and military computers and target “high-value” entities across Ukraine, Russia, Georgia, and Belarus for information harvesting. The findings come from a map put together by Check Point Research and genetic malware analysis firm Intezer, making it first-ever comprehensive analysis of state-backed Russian-attributed threat groups that have been found to engage in disruptive, cutting-edge cyber warfare. “The size of the resource investment and the way the Russians are organizing themselves in silos makes them able to carry…

This story continues at The Next Web

TheNextWeb?d=yIl2AUoC8zA TheNextWeb?i=9VGKoSmJFaE:FW8ZiF0Z_co:V_s

%d bloggers like this: