Chinese “Mustang Panda” hackers now deploying new “Hordur” malware.

Views expressed in this cybersecurity-cyber espionage-cybercrime update are those of the reporters and correspondents.

Accessed on 23 March 2022, 2126 UTC.

Content provided by email subscription to “The Hacker News Daily Updates.”

Source:

https://mail.google.com/mail/u/0/#inbox/FMfcgzGmvfSlnrWCPGzSCkpGCWnbRNNv

Please click link or scroll down to read your selections.

The Hacker News Daily Updates

Python All-in-One For Dummies, 2nd Edition ($24.00 Value) FREE for a Limited Time

The one-stop resource for all your Python queries

Download Now Sponsored
LATEST NEWS Mar 23, 2022

Chinese ‘Mustang Panda’ Hackers Spotted Deploying New ‘Hodur’ Malware

A China-based advanced persistent threat (APT) known as Mustang Panda has been linked to an ongoing cyberespionage campaign using a previously undocumented variant of the PlugX remote access trojan on infected machines. Slovak cybersecurity firm ESET dubbed the new version Hodur, owing to its …

Read More

New Variant of Chinese Gimmick Malware Targeting macOS Users

Researchers have disclosed details of a newly discovered macOS variant of a malware implant developed by a Chinese espionage threat actor known to strike attack organizations across Asia. Attributing the attacks to a group tracked as Storm Cloud, cybersecurity firm Volexity characterized the new …

Read More

Use This Definitive RFP Template to Effectively Evaluate XDR solutions

A new class of security tools is emerging that promises to significantly improve the effectiveness and efficiency of threat detection and response. Emerging Extended Detection and Response (XDR) solutions aim to aggregate and correlate telemetry from multiple detection controls and then …

Read More

Over 200,000 MicroTik Routers Worldwide Are Under the Control of Botnet Malware

Vulnerable routers from MikroTik have been misused to form what cybersecurity researchers have called one of the largest botnet-as-a-service cybercrime operations seen in recent years.  According to a new piece of research published by Avast, a cryptocurrency mining campaign leveraging the …

Read More

Microsoft and Okta Confirm Breach by LAPSUS$ Extortion Group

Microsoft on Tuesday confirmed that the LAPSUS$ extortion-focused hacking crew had gained “limited access” to its systems, as authentication services provider Okta revealed that nearly 2.5% of its customers have been potentially impacted in the wake of the breach. “No customer code or data was …

Read More
 

Python All-in-One For Dummies, 2nd Edition ($24.00 Value) FREE for a Limited Time

The one-stop resource for all your Python queries

Download Now Sponsored

For the latest cybersecurity news and information, please check the blog sidebar, links, and twitter posts.  Thanks for joining us today.

Russ Roberts

https://cyber-security-intelligence.org

https://paper.li/RussellRoberts (machine learning, artificial intelligence, IoT, information security)