Global Cyber Espionage Campaign Monitors Actions, Steals Data, Adapts to Avoid Detection

April 13, 2015  Security Suite

A global cyber espionage campaign has been discovered by security vendor Check Point, which reports numerous large targets have been penetrated by a persistent attacker group with possible political ties in Lebanon.  According to Check Point, the highly targeted and well-managed malware quietly watches a network, steals data, and quickly adapts if it is detected by antivirus systems. This attack campaign, called Volatile Cedar, begins with a vulnerability scan of the target server. Once an exploitable vulnerability is located, it is used to inject a web shell code into the server. The web shell is then used by the attacker to control the victim’s server and is the means through which a custom-made trojan, called Explosive, is implanted. This Trojan allows the attackers to send commands, such as keylogging, clipboard logging, screenshots, run commands, etc., to its targets.

Back to News Archive

News of the Month

Stagefright - probably the most dangerous threat to smartphones right now

August 25, 2015  Security Suite

Can you imagine a single received MMS could allow hackers to access all your data on your phone? Meet Stagegright, the exploit that is a threat for 950 million smartphones with Android. Vulnerability like this is very dangerous because it does not require any action by the victim - all the hacker needs to compromise your smarthphone is your phone number.

Ajuda de produto

Vá à nossa Secção de Ajuda encontre rapidamente solução para os problemas que possa ter com os nossos produtos.

Full IT Glossary

Procure termos técnicos no nosso completo glossário! Use isto como uma ferramenta de referência para ficar por dentro de informações e definições úteis.

Visitar Glossário IT

Em Destaque

PCRx Backup

Backup automático dos seus dados importantes!

Saber mais