YIKES: Fancy Bear Linux Rootkit

Vladimir_Putin_GRUHeads-Up! The CyberWire staff wrote: "The US National Security Agency and Federal Bureau of Investigation yesterday issued a joint alert concerning a new malware toolset operated by Russia's military intelligence service, GRU. The advisory describes Drovorub, malware deployed by APT28, which of course is Fancy Bear. Drovorub is a multifunctional "Linux malware toolset consisting of an implant coupled with a kernel module rootkit, a file transfer and port forwarding tool, and a Command and Control (C2) server." So far it seems that Fancy Bear is Drovorub's only user. Both NSA and the Bureau offer advice on how to detect the malware and protect against it. The warning is being taken seriously: as the Register puts it, four words you don't want to see together are "Fancy Bear Linux rootkit."

Kaspersky researchers have published an update on the activities of "CactusPete" (also known as Karma Panda), a Chinese APT that's using a new form of the Bisonal backdoor against defense and banking targets in Eastern Europe. Capability of handling Cyrillic script suggests that its activities extend east through Ukraine, Belarus, and Russia. It's a cyberespionage campaign, but it may also represent reconnaissance and battlespace preparation for more damaging attacks. Karma Panda has earlier been active against Japan, South Korea, and the United States."

Knowing that spear phishing is one of their go-to social engineering tactics, stay safe out there and step those users through new-school security awareness training!

Request A Quote: Security Awareness Training

products-KB4SAT6-2-1New-school Security Awareness Training is critical to enabling you and your IT staff to connect with users and help them make the right security decisions all of the time. This isn't a one and done deal, continuous training and simulated phishing are both needed to mobilize users as your last line of defense. Request your quote for KnowBe4's security awareness training and simulated phishing platform and find out how affordable this is!

Get A Quote Now

PS: Don't like to click on redirected buttons? Cut & Paste this link in your browser:


Topics: Phishing

Subscribe To Our Blog

Ransomware Hostage Rescue Manual

Get the latest about social engineering

Subscribe to CyberheistNews