More

    China government-linked hackers caught running a seriously dangerous ransomware scam




    • Symantec researchers observed Chinese state-sponsored threat actors running ransomware against an Asian software and services firm
    • They claim it’s highly unusual activity for state attackers
    • The attackers demanded $2 million in ransom

    Emperor Dragonfly, a known Chinese state-sponsored threat actor, recently did something unusual – it deployed a ransomware encryptor on a target’s network.

    A report from Symantec’s Threat Hunter Team, which observed the attack in late 2024, noted how they had observed, on multiple occasions, the group doing what it usually does – side-loading malicious DLL files (via a legitimate Toshiba executable) to drop backdoors and establish persistence. The goal was, as it’s usual with state-sponsored attackers, cyber-espionage.

    https://cdn.mos.cms.futurecdn.net/EEXAxCUDKAq3frELz3rVYY-1200-80.jpg



    Source link

    Latest articles

    spot_imgspot_img

    Related articles

    spot_imgspot_img