Arthur T Knackerbracket has found the following story:
The APT known as TA410 has added a modular remote-access trojan (RAT) to its espionage arsenal, deployed against Windows targets in the United States’ utilities sector.
According to researchers at Proofpoint, the RAT, called FlowCloud, can access installed applications and control the keyboard, mouse, screen, files, services and processes of an infected computer, with the ability to exfiltrate information to a command-and-control (C2) provider. It appears to be related to previous attacks delivering the LookBack malware.
The RAT first scurried onto the scene last summer as part of a spear-phishing campaign. Utility providers received training- and certification-related emails with subject lines such as “PowerSafe energy educational courses (30-days trial),” containing portable executable (PE) attachments, according to a Monday Proofpoint analysis.
To make the effort more convincing, the threat actor-controlled domains that delivered the emails impersonated energy-sector training services, and used subdomains which contained the word “engineer.”
[APT - Advanced Persistent Threat]
(Score: 2) by Kitsune008 on Thursday June 11 2020, @12:02AM (1 child)
Nailed it in one.
Bottom line, if it's connected to the internet, it can be hacked(and probably has/will be hacked). Period.
I keep hearing about such and such infrastructure being infiltrated/hacked, or the possibility of this. I keep asking myself WHY? I could understand it in the 1980's, but almost 40 years later?!?! WTF?!?
Pointy haired bosses and stupid (lack of)security practices will bite us in the ass, hard, in the near future I'm afraid...all in the race for profits in the near term.
(Score: 0) by Anonymous Coward on Thursday June 11 2020, @04:26PM
LEA bait.