cybersecurity

4154 readers
31 users here now

An umbrella community for all things cybersecurity / infosec. News, research, questions, are all welcome!

Community Rules

Enjoy!

founded 2 years ago
MODERATORS
1
 
 
2
3
 
 

cross-posted from: https://lemmy.sdf.org/post/35479238

Archived

A previously unknown Russian hacker group that has been given the moniker “Laundry Bear” has spent roughly a year targeting government and commercial entities in the Netherlands and other NATO and EU countries, according to a joint report from the Dutch General Intelligence and Security Service (AIVD) and the Military Intelligence and Security Service (MIVD).

The group, believed to be operating on behalf of the Kremlin, was first detected in September 2024 after stealing sensitive data on approximately 63,000 Dutch police officers. According to Politico, nearly the entire Dutch police force was affected by the breach.

[...]

A technical investigation into the victims indicated that Laundry Bear likely sought sensitive information on the procurement and production of military equipment by Western governments, as well as details on weapons deliveries to Ukraine. Dutch intelligence services observed that the group appears to possess a certain level of insight into the defense production and supply chains involved. Laundry Bear has also targeted companies developing advanced technologies that are difficult for Russia to acquire due to Western sanctions.

[...]

Microsoft is conducting its own investigation into the group, which exploited the company’s Exchange servers. Microsoft has named the threat actor “Void Blizzard.”

[...]

One example cited in the report includes a PDF attachment from Laundry Bear disguised as an invitation to a European Defense and Security Summit and containing a QR code that led to a phishing website.

Laundry Bear employed a variety of hacking techniques, including cookie theft and replacement, password brute-forcing, and phishing (using fake emails or messages to steal login credentials). While these methods are relatively simple, identifying the group behind the attacks is challenging. However, AIVD notes that APT28 (also known as Fancy Bear) — a group linked to Russia’s GRU military intelligence agency — uses similar methods and typically targets the same types of institutions.

4
5
 
 

cross-posted from: https://lemmy.sdf.org/post/35480023

Archived

[...]

Ambassador Peter Mandelson [UK ambassador to the U.S. in Washington] warned of the consequences if China continues to get ahead in AI and other key technologies.

“They will be able to do things which cascade down not just to their own country but everyone else’s across the world,” Mandelson said at an event hosted by the Atlantic Council in Washington on Tuesday.

[...]

Before being appointed ambassador, Lord Mandelson had criticized the Conservative-led government for mismanaging ties with China and called for a thaw in relations. He is a founder of Global Counsel, a firm that’s become one of the most influential advisory groups in the UK and has been expanding its coverage of China.

The Labour government under Prime Minister Keir Starmer has been pursuing closer ties with Beijing despite unease in Washington and other UK allies.

Mandelson said UK-China relations are unlikely to return to where they were a decade ago.

“We’re not going to to back to the ‘Golden Era’ of Cameron,” he said, referring to former Prime Minister David Cameron, whose government hosted Chinese President Xi Jinping in 2015 in a visit hailed as a breakthrough in ties.

Since then, London’s relationship with Beijing has deteriorated over a crackdown on pro-democracy protests in Hong Kong, its support for Russia’s war in Ukraine, and alleged cyberattacks and spying operations in the UK.

Mandelson also cautioned the European Union to be “much more skeptical” about building closer ties with China, even as the two sides step up their engagement to push back against the Trump administration’s tariffs.

The ambassador called for a “reboot” of the trans-Atlantic alliance not only in technology but also defense, pointing to the war in Ukraine as a “brutal wake-up call.” He said European defense needs to step up and become less dependent on the US.

[...]

“We [Europeans] have lived in a fantasy created by the US security guarantee, complacent that a friendly heavyweight across the water would be always there when the going gets tough,” he said.

6
7
8
9
10
11
12
13
 
 

cross-posted from: https://lemmy.sdf.org/post/35125971

Archived

Danish firms have found “suspicious” components added to east Asian circuit boards that were supposed to be built into the country’s green energy infrastructure, according to an industry body.

It has raised concerns about the potential for remote disruption of the power supply or digital espionage, coming a week after the US claimed to have identified “kill switches” in a consignment of solar panels and batteries from China.

[...]

Green Power Denmark, an umbrella group for 1,500 Danish renewable technology companies, said the components from “the East” had been found during routine checks on a “development project” that had at no point been connected to the grid.

“It’s a clear warning: threats to energy security can hide in plain sight,” the organisation said. “The real danger isn’t always sabotage. It can also be unlisted components. Hidden functions. That’s why Danish energy companies dismantle and inspect before anything goes live.”

Jorgen Christensen, Green Power Denmark’s technical director, said there was no proof of foul play and it was possible that the mysterious electronics had been included to add some kind of innocent function to the circuit boards.

“It’s possible the supplier had no malicious intent,” he told Reuters. “We can’t say at this point. But that doesn’t change the fact that these components shouldn’t be there.”

Walburga Hemetsberger, head of the lobby group SolarPower Europe, said the discovery was highly concerning and called for an investigation.

[...]

In recent years experts have issued increasingly strident warnings about the security risk posed by China’s stranglehold over the supply of many categories of renewable energy components in Europe, such as batteries, turbines and the inverters used to smooth the voltage of power as it is fed into the grid.

The large-scale blackout that occurred a fortnight ago across much of Spain and Portugal, both of which depend heavily on Chinese-made solar energy infrastructure, has further concentrated minds on the issue.

[...]

14
15
 
 

This project implements a FastAPI-based local server designed to load one or more pre-trained NLP models during startup and expose them through a clean, RESTful API for inference.

For example, it leverages the Hugging Face transformers library to load the CIRCL/vulnerability-severity-classification-distilbert-base-uncased model, which specializes in classifying vulnerability descriptions according to their severity level. The server initializes this model once at startup, ensuring minimal latency during inference requests.

Clients interact with the server via dedicated HTTP endpoints corresponding to each loaded model. Additionally, the server automatically generates comprehensive OpenAPI documentation that details the available endpoints, their expected input formats, and sample responses—making it easy to explore and integrate the services.

The ultimate goal is to enrich vulnerability data descriptions through the application of a suite of NLP models, providing direct benefits to Vulnerability-Lookup and supporting other related projects.

Conceptual architecture

16
17
 
 

cross-posted from: https://lemmy.sdf.org/post/35141215

Archived

Here is the German Federal Office for Information Security's original press release (and a link to download the paper, both in German)

[...]

The German Federal Office for Information Security said has for years ranked energy sector at a "high" risk of hacking. Recent shifts including new technologies such as internet-connected solar power inverters and a tense geopolitical situation should nonetheless spark increased concern, the agency said.

[...]

The growth of decentralized energy sector operations make the grid more complex to secure since thousands of smaller players with photovoltaic systems become part of the grid. Solar inverters and grid control technology is additionally at risk of supply chain attacks, the German agency [better known as the BSI for its German acronym] said.

"A successful disturbance of energy supply in Germany or Europe is a horror scenario for citizens, the German economy and the state bodies. Social life would come to a standstill, the economic damage would be enormous," said BSI President Claudia Plattner.

[...]

The agency last year identified a slew of nation-state groups targeting German critical infrastructure, including China's Nylon Typhoon and Russian groups Fancy Bear and Midnight Blizzard.

[...]

18
 
 

cross-posted from: https://lemmy.sdf.org/post/35083943

Archived

Advanced persistent threat (APT) groups with ties to China have become persistent players in the cyber espionage landscape, with a special emphasis on European governmental and industrial entities, according to a thorough disclosure from ESET’s APT Activity Report for Q4 2024 to Q1 2025.

The report, covering activities from October 2024 to March 2025, highlights the sophisticated tactics and tools employed by these threat actors to infiltrate sensitive networks.

[...]

These diverse and innovative techniques illustrate the persistent dedication of China-aligned APTs to espionage, often prioritizing long-term access over immediate financial returns.

The ESET report emphasizes that the highlighted operations are merely a snapshot of the broader threat landscape, with intelligence derived from proprietary telemetry data and verified by expert researchers.

The sustained focus on European targets by these APT groups signals a strategic intent to gather sensitive political and industrial intelligence, potentially influencing geopolitical dynamics.

[...]

19
20
21
 
 

This joint cybersecurity advisory (CSA) highlights a Russian state-sponsored cyber campaign targeting Western logistics entities and technology companies. This includes those involved in the coordination, transport, and delivery of foreign assistance to Ukraine. Since 2022, Western logistics entities and IT companies have faced an elevated risk of targeting by the Russian General Staff Main Intelligence Directorate (GRU) 85th Main Special Service Center (85th GTsSS), military unit 26165—tracked in the cybersecurity community under several names (see “Cybersecurity Industry Tracking”). The actors’ cyber espionage-oriented campaign, targeting technology companies and logistics entities, uses a mix of previously disclosed tactics, techniques, and procedures (TTPs). The authoring agencies expect similar targeting and TTP use to continue.

Executives and network defenders at logistics entities and technology companies should recognize the elevated threat of unit 26165 targeting, increase monitoring and threat hunting for known TTPs and indicators of compromise (IOCs), and posture network defenses with a presumption of targeting.

This cyber espionage-oriented campaign targeting logistics entities and technology companies uses a mix of previously disclosed TTPs and is likely connected to these actors’ wide scale targeting of IP cameras in Ukraine and bordering NATO nations.

22
23
 
 

Weekly thread to discuss whatever you’re working on, big or small, at work or in your free time.

24
 
 
  • AI media generation is a significant trend in how we use the Internet in 2025. Kling AI is a widely used platform, with 6 million users since its launch in June 2024.
  • A threat actor mimicked Kling AI and drove traffic to a convincing fake website via counterfeit Facebook pages and paid ads.
  • User submissions of a text prompt or image on this fake site produce a seemingly innocent media file whose filename uses Hangul Filler characters to conceal an executable.
  • In some cases, the executable’s loader used .NET Native AOT compilation for stealth. Executing it installs an infostealer with monitoring capabilities.
  • This campaign has a global reach, with victims reported across multiple regions, most notably in Asia.
25
view more: next ›