Aggregator
追寻红色足迹 感受革命历史 | 以高质量理论实践学习推进党员教育培训高质量发展
What is a spoofing attack? What Financial Institutions Need to Know
August Recap: New AWS Sensitive Permissions and Services
As AWS continues to evolve, new services and permissions are frequently introduced to enhance functionality and security. This blog provides a comprehensive recap of new sensitive permissions and services added in August 2024. Our intention in sharing this is to flag the most important releases to keep your eye on and update your permissions and […]
The post August Recap: New AWS Sensitive Permissions and Services appeared first on Security Boulevard.
Mallox ransomware: in-depth analysis and evolution
RansomHub
Шляпа, покорившая математику: как хобби энтузиаста решило 50-летнюю загадку геометрии
苹果开始在印度生产新款 iPhone 高端机型
看雪安卓1w班更新【第十章】静态分析——常用工具介绍
因公开被盗数据,一安全研究员被起诉涉嫌非法泄露数据
2024 KCTF 大赛 | 第九题《第一次接触》设计思路及解析
New Eucleak attack lets threat actors clone YubiKey FIDO keys
评论 | 整治“指尖上的形式主义”
4问+1图 | 读懂《关于推动新型信息基础设施协调发展有关事项的通知》
发布 | 中国信通院发布《大模型落地路线图研究报告(2024年)》(附下载)
专家观点 | 抗量子密码:为全球网络安全筑起新防线
专家观点 | 法律如何应对人工智能的发展
通知 | 工信部等十一部门联合发文 推动新型信息基础设施协调发展(附全文)
实习招聘 | 《中国信息安全》杂志社招聘实习生啦!
FBI Warns of North Korea Attacks Against the Crypto Industry
The decentralized finance (DeFi) and
cryptocurrency industries are being targeted by North Korean social engineering
schemes in highly personalized and convincing ways.
Here is an example that the FBI is showcasing:
1.
A
person from your dream company, using the name of an old colleague, contacts
you on social media, mentioning a conference you both recently attended and
discussing shared interests.
2.
He
asks if you're job hunting and reveals his company needs your skills, offering
a significant pay raise. He arranges an
interview with his CTO and during the interview, the CTO gives you a
“pre-employment” test that involves troubleshooting code from some GitHub
repositories you do not recognize.
3.
You
clone the repositories, execute the code, find the bugs, and pass the test with
flying colors.
Congrats - you have fallen for a well-disguised
social engineering scheme conducted by North Korean cyber actors. One of those
GitHub repositories was malicious and landed a malware dropper on your machine
which installed a key logger and acquired your credentials to access your
company’s network.
The North Korean attackers gain access and moving
laterally, eventually getting access to the seed phrases and security
signatures for your company’s cryptocurrency assets. Shortly thereafter all the company’s crypto
assets disappear and everything you and your colleagues worked for is gone.
The threat is real.
Check out the full FBI public warning here: https://www.ic3.gov/Media/Y2024/PSA240903
The post FBI Warns of North Korea Attacks Against the Crypto Industry appeared first on Security Boulevard.