• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

State-Sponsored Hackers Targeting Journalists

You are here: Home / General Cyber Security News / State-Sponsored Hackers Targeting Journalists
July 14, 2022

APT teams are increasingly focusing on journalists and impersonating media shops, in accordance to new research from Proofpoint.

The groups – who are point out-based mostly or point out-aligned actors, are seeking to acquire entry to delicate details and resources, manipulate information and deceive general public relations and other business pros into contemplating that they are dealing with legitimate news stores.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


In accordance to researchers at Proofpoint, there has been a “sustained effort” by APT actors to “target or leverage journalists and media personas.” These attacks improved all-around the US election in 2021, with a certain emphasis on US-dependent journalists masking nationwide security and politics.

Some APT teams are utilizing phishing and other techniques to attain access to journalists’ email and communications and to have out reconnaissance on their network and operating environments. They are also targeting reporters’ social media accounts.

Other individuals are employing phony newsletters, purporting to arrive from perfectly-acknowledged media brand names, to entice in authorities throughout a array of industries, specially in the US, Middle East and Israel.

And some are applying phony journalists’ identities to concentrate on industry experts in academia and coverage, once again in particular in the Center East. Proofpoint thinks these are credential harvesting attacks.

The researchers identified the Chinese team TA412, aka Zirconium, as concentrating on US-primarily based journalists, to validate targeted email messages. The group is employing web beacon procedures.

A different Chinese team, TA459, stands accused of spreading the Chinoxy malware that sets up a back doorway on victims’ equipment. In Turkey, group TA482 was identified to be associated in credential harvesting. Proofpoint assessed that TA482 is aligned with the Turkish state.

The researchers also identified a further more team, TA453 or Charming Kitten, which they believe supports the Iranian Revolutionary Guard Corps. This team, they say, routinely poses as journalists to set up discussions with concentrate on folks concerned in Center Jap affairs.

A even more Iranian group, TA456 or Tortoiseshell, is thought to be driving pretend newsletters created to appear as if they arrive from Fox News or The Guardian. And TA457 is claimed to pose as “iNews Reporter” to PR staff in the US, Israel and Saudi Arabia.

“Cyber-criminals are more and more leveraging journalists’ public profiles to dupe targets businesses need to have to have out some point-checking of their own to validate identities ahead of responding or sharing sensitive details,” warned Christian Borst, CTO EMEA at security vendor Vectra AI.

“The much more innovative the attacker, the much better the impersonation is tailored to the context. Irrespective of whether 1 is impersonating a C-Degree [executive], a relatives member in want, a parcel shipping and delivery service, or a journalist all relies upon on the context and the target.”


Some pieces of this article are sourced from:
www.infosecurity-journal.com

Previous Post: «Cyber Security News Microsoft Details How Phishing Campaign Bypassed MFA
Next Post: ICO crackdown on AI recruitment part of three-year vision to save businesses £100 million ico crackdown on ai recruitment part of three year vision to»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Cybercriminals Using New ASMCrypt Malware Loader Flying Under the Radar
  • Lazarus Group Impersonates Recruiter from Meta to Target Spanish Aerospace Firm
  • Post-Quantum Cryptography: Finally Real in Consumer Apps?
  • Microsoft’s AI-Powered Bing Chat Ads May Lead Users to Malware-Distributing Sites
  • Progress Software Releases Urgent Hotfixes for Multiple Security Flaws in WS_FTP Server
  • Cisco Warns of Vulnerability in IOS and IOS XE Software After Exploitation Attempts
  • GitHub Repositories Hit by Password-Stealing Commits Disguised as Dependabot Contributions
  • China’s BlackTech Hacking Group Exploited Routers to Target U.S. and Japanese Companies
  • The Dark Side of Browser Isolation – and the Next Generation Browser Security Technologies
  • China-Linked Budworm Targeting Middle Eastern Telco and Asian Government Agencies

Copyright © TheCyberSecurity.News, All Rights Reserved.