Leakers publish source code of Iranian hacking tools Watch Now As fellow ZDNet writer Andrada Fiscutean once wrote in the fall of 2017: ” Spies hack. But the best spies hack other spies .” That story revolved around a Virus Bulletin 2017 talk detailing several mysterious cases where APTs (advanced persistent threats, a technical term used to describe government-backed hacking units) appeared to had compromised the infrastructure of other APTs, either by accident, or intentionally. The article mentioned how two North Korean APTs hacked the same “staging” server to launch attacks against their targets, but without appearing to have known about each other’s presence on the same system. And it also mentioned the case of a mysterious Chinese APT that hacked the control panel of command and control (C&C) servers operated by a Russian APT (Crouching Yeti, DragonFly) to deploy a hidden tracking pixel to monitor every time Russian operators logged into their accounts to launch attacks. A new instance of “spies hack other spies” But today, in a report published by Symantec and shared with ZDNet , the US-based cyber-security company said it found another case of a country’s APT hacking into the infrastructure of another country’s APT. The… Read full this story
- A Magic Number You Need to Know
- All About Iran’s Military Power
- Sanya Property Investments - Southeast Asia's Latest Booming Tropical Paradise - Should You Buy Now
- An Overview on the Indian Distance Learning Education System
Russian APT hacked Iranian APT's infrastructure back in 2017 have 238 words, post on www.zdnet.com at June 20, 2019. This is cached page on CuBird. If you want remove this page, please contact us.