• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

SolarWinds Hackers Go Phishing

You are here: Home / General Cyber Security News / SolarWinds Hackers Go Phishing
May 28, 2021

American multinational technology firm Microsoft suggests that the menace group guiding the Microsoft and SolarWinds hack has released a massive new phishing marketing campaign concentrating on governing administration organizations, NGOs and think tanks. 

Past calendar year, an state-of-the-art persistent risk (APT) team exploited vulnerabilities in Microsoft and SolarWinds systems to have out a supply-chain attack that trojanized SolarWinds’ Orion enterprise software program updates to distribute malware. Nine US federal businesses and about 100 businesses ended up focused.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


According to Microsoft, Russian-based mostly APT team Nobelium was not only driving that attack but is now managing a phishing marketing campaign that has presently targeted thousands of email accounts all-around the entire world. 

“This 7 days we observed cyber-attacks by the danger actor Nobelium concentrating on govt companies, believe tanks, consultants, and non-governmental companies,” wrote Microsoft’s vice president of customer security and have confidence in, Tom Burt, in a blog post published on Thursday.

“This wave of attacks targeted about 3,000 email accounts at a lot more than 150 unique businesses.”

Burt explained that corporations in at least 24 distinctive nations around the world were being impacted, with the the greater part of victims positioned in the United States.

At the very least 1 in 4 of the businesses specific are concerned in international advancement, humanitarian, and human rights get the job done. 

“These attacks show up to be a continuation of various attempts by Nobelium to focus on govt agencies associated in foreign policy as part of intelligence gathering initiatives,” wrote Burt.

Nobelium launched the phishing campaign by getting obtain to the Continuous Call account of USAID.

“From there, the actor was capable to distribute phishing emails that seemed genuine but bundled a url that, when clicked, inserted a malicious file used to distribute a backdoor we contact NativeZone,” wrote Burt. 

“This backdoor could empower a huge range of things to do from thieving facts to infecting other desktops on a network.”

Electronic Shadows threat researcher Stefano De Blasi claimed that Nobelium’s alleged malicious exercise exemplified how focused phishing campaigns continue to represent a critical danger from establishments of any variety. 

He extra: “This marketing campaign is the latest testament to this group’s goal of accumulating sensitive and really beneficial data from Western businesses working in the governing administration and exterior affairs industry.”


Some elements of this article are sourced from:
www.infosecurity-magazine.com

Previous Post: «researchers warn of facefish backdoor spreading linux rootkits Researchers Warn of Facefish Backdoor Spreading Linux Rootkits
Next Post: US Jails Telemarketing Fraudster Cyber Security News»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.