Friday, November 27, 14:53
Home security Hackers for rent target law and fintech companies!

Hackers for rent target law and fintech companies!

Kaspersky, a Russian company cyber security, has discovered a new group of hackers for rent that seems to be active for a decade. This group, which Kaspersky named "Deceptikons", has targeted mainly law firms as well as fintech companies, according to Kaspersky's researcher Vicente Diaz.


According to Diaz, the group seems to be focusing more on stealing business and financial information than on stealing information governments. He added that most of the team's goals are in Europe, but also in Middle Eastern countries, such as Israel, Jordan and Egypt.

Deceptikons hackers

The most recent attacks of the "Deceptikons" group include one Phishing 2019 campaign, targeting numerous law firms and fintech companies, where the team maliciously developed PowerShell scripts to infect computers.


In addition, Kaspersky explained that the team is not technically advanced, and does not appear to have zero - day holdings. The Russian cybersecurity company also described the infrastructure and malware of the group as "Smart, but not technically advanced", while the main goal of the team was to acquire access on infected computers.

hackers for rent

Most attacks of “Deceptikons” seem to follow a similar tactic, starting with spear-phishing carrying a maliciously modified LNK (shortcut) file. If victims download and click on the file, the shortcut downloads and executes one backdoor trojan based on PowerShell.


In the coming weeks, Kaspersky will publish a more detailed technical report, which will provide more information about the activities of "Deceptikons".
It is worth noting that this is the second large group of hackers for hire that came to light this year, as Citizen Lab had previously revealed that the Indian company BellTroX InfoTech Services was the team behind it Dark Basin APT.

hackers for rent

However, Kaspersky does not currently associate Deceptikons with any particular entity.

LEAVE ANSWER

Please enter your comment!
Please enter your name here

Pohackontas
Pohackontashttps://www.secnews.gr
Every accomplishment starts with the decision to try.

LIVE NEWS

The US military is investigating "telepathic" communication technology

The U.S. Army Research Bureau is funding a new study on how brain signals could ...

Canon acknowledged the ransomware attack in August

About three months later, Canon publicly confirmed the ransomware attack it suffered in early August, which affected servers ...

Hackers love expired domains

Sometimes, website owners do not want to continue to have a domain name and allow it to ...

Word: How to add the same text to multiple documents with one link

Microsoft Word makes it easy to add the same text to multiple documents. This is especially convenient for text with special formatting, the ...

Black Friday: Cybercriminals are monitoring your shopping

Due to the conditions that have emerged from the pandemic of COVID-19, the online shopping will be particularly high on Black Friday and ...

US fertility: Ransomware attack on the largest fertility network in the USA!

US Fertility, the largest fertility network in the US, announced that some of its systems were encrypted in an ransomware attack that ...

Phishing attack pretends to be an invitation to a Zoom meeting

A massive phishing attack has been going on since yesterday, pretending to be an invitation to a meeting at Zoom.

Yanis Varoufakis: Demands a boycott of Amazon on Black Friday

The former Minister of Finance of Greece and leader of the political party "MERA 25", Giannis Varoufakis, demands a boycott of Amazon on the day of Black ...

Personal data of patients with COVID-19 have been leaked to the internet

Personal data and health data of about 16 million Brazilian patients with COVID-19 were exposed on the Internet, as a hospital employee uploaded to GitHub ...

The American company Rand McNally was attacked by a cyber

Chicago-based technology company Rand McNally is working to restore the functionality of its network after the ...