Close Menu
    Facebook LinkedIn YouTube WhatsApp X (Twitter) Pinterest
    Trending
    • Efficient hybrid minivan delivers MPG
    • How Can Astronauts Tell How Fast They’re Going?
    • A look at the AI nonprofit METR, whose time-horizon metrics are used by AI researchers and Wall Street investors to track the rapid development of AI systems (Kevin Roose/New York Times)
    • Double Dazzle: This Weekend, There Are 2 Meteor Showers in the Night Sky
    • asexual fish defy extinction with gene repair
    • The ‘Lonely Runner’ Problem Only Appears Simple
    • Binance and Bitget to probe a rally in RaveDAO’s RAVE token, which surged 4,500% in a week, after ZachXBT alleged RAVE insiders engineered a large short squeeze (Francisco Rodrigues/CoinDesk)
    • Today’s NYT Connections Hints, Answers for April 19 #1043
    Facebook LinkedIn WhatsApp
    Times FeaturedTimes Featured
    Sunday, April 19
    • Home
    • Founders
    • Startups
    • Technology
    • Profiles
    • Entrepreneurs
    • Leaders
    • Students
    • VC Funds
    • More
      • AI
      • Robotics
      • Industries
      • Global
    Times FeaturedTimes Featured
    Home»News»Financially motivated hackers are helping their espionage counterparts and vice versa
    News

    Financially motivated hackers are helping their espionage counterparts and vice versa

    Editor Times FeaturedBy Editor Times FeaturedFebruary 18, 2025No Comments3 Mins Read
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr WhatsApp Email
    Share
    Facebook Twitter LinkedIn Pinterest Telegram Email WhatsApp Copy Link

    On Thursday, researchers with the Symantec safety agency reported on a collaboration that labored the opposite manner—use by the RA World ransomware group of a “distinct toolset” that beforehand has been seen used solely in espionage operations by a China-linked menace group.

    The toolset, first noticed in July, was a variant of PlugX, a customized backdoor. Timestamps within the toolset have been an identical to these discovered by safety agency Palo Alto Community within the Thor PlugX variant, which firm researchers linked to a Chinese language espionage group tracked below the names Fireant, Mustang Panda, and Earth Preta. The variant additionally had similarities to the PlugX kind 2 variant discovered by safety agency Development Micro.

    Additional espionage assaults involving the identical PlugX variant occurred in August, when the attacker compromised the federal government of a southeastern European nation. That very same month, the attacker compromised a authorities ministry in a Southeast Asian nation. In September 2024, the attacker compromised a telecoms operator in that area, and in January, the attacker focused a authorities ministry in one other Southeast Asian nation.

    Symantec researchers have competing theories in regards to the purpose for this collaboration:

    There may be proof to counsel that this attacker could have been concerned in ransomware for a while. In a report on RA World assaults, Palo Alto mentioned that it had discovered some hyperlinks to Bronze Starlight (aka Emperor Dragonfly), a China-based actor that deploys completely different ransomware payloads. One of many instruments  used on this ransomware assault was a proxy software referred to as NPS, which was created by a China-based developer. This has beforehand been utilized by Bronze Starlight. SentinelOne, in the meantime, reported that Bronze Starlight had been concerned in assaults involving the LockFile, AtomSilo, NightSky, and LockBit ransomware households.

    It’s unclear why an actor who seems to be linked to espionage operations can also be mounting a ransomware assault. Whereas this isn’t uncommon for North Korean menace actors to have interaction in financially motivated assaults to subsidize their operations, there is no such thing as a related historical past for China-based espionage menace actors, and there’s no apparent purpose why they might pursue this technique.

    One other chance is that the ransomware was used to cowl up proof of the intrusion or act as a decoy to attract consideration away from the true nature of the espionage assaults. Nonetheless, the ransomware deployment was not very efficient at masking up the instruments used within the intrusion, significantly these linking it again to prior espionage assaults. Secondly, the ransomware goal was not a strategically vital group and was one thing of an outlier in comparison with the espionage targets. It appears uncommon that the attacker would go to such lengths to cowl up the character of their marketing campaign. Lastly, the attacker gave the impression to be critical about gathering a ransom from the sufferer and appeared to have hung out corresponding with them. This often wouldn’t be the case if the ransomware assault was merely a diversion.

    The most probably state of affairs is that an actor, probably one particular person, was making an attempt to make some cash on the aspect utilizing their employer’s toolkit.

    Tuesday’s report from Mandiant additionally famous using state-sponsored malware by crime teams. Mandiant researchers additionally reported observing what they imagine are Twin Motive teams that search each monetary achieve and entry for espionage.



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Editor Times Featured
    • Website

    Related Posts

    A look at the AI nonprofit METR, whose time-horizon metrics are used by AI researchers and Wall Street investors to track the rapid development of AI systems (Kevin Roose/New York Times)

    April 19, 2026

    Binance and Bitget to probe a rally in RaveDAO’s RAVE token, which surged 4,500% in a week, after ZachXBT alleged RAVE insiders engineered a large short squeeze (Francisco Rodrigues/CoinDesk)

    April 19, 2026

    Mistral, which once aimed for top open models, now leans on being an alternative to Chinese and US labs, says it’s on track for $80M in monthly revenue by Dec. (Iain Martin/Forbes)

    April 19, 2026

    Airbnb launches a pilot in NYC, LA, and other cities that lets users to select from a range of boutique hotels alongside private homes in a bid to boost growth (Stephanie Stacey/Financial Times)

    April 19, 2026

    Anthropic’s Mythos adds to concerns about rising workloads for open-source maintainers, as many have already been dealing with a “crazy” number of bug reports (Chris Stokel-Walker/Bloomberg)

    April 18, 2026

    Salesforce announces Headless 360, an initiative that will give AI agents access to Salesforce’s platform capabilities through APIs, MCP tools or CLI commands (Michael Nuñez/VentureBeat)

    April 18, 2026

    Comments are closed.

    Editors Picks

    Efficient hybrid minivan delivers MPG

    April 19, 2026

    How Can Astronauts Tell How Fast They’re Going?

    April 19, 2026

    A look at the AI nonprofit METR, whose time-horizon metrics are used by AI researchers and Wall Street investors to track the rapid development of AI systems (Kevin Roose/New York Times)

    April 19, 2026

    Double Dazzle: This Weekend, There Are 2 Meteor Showers in the Night Sky

    April 19, 2026
    Categories
    • Founders
    • Startups
    • Technology
    • Profiles
    • Entrepreneurs
    • Leaders
    • Students
    • VC Funds
    About Us
    About Us

    Welcome to Times Featured, an AI-driven entrepreneurship growth engine that is transforming the future of work, bridging the digital divide and encouraging younger community inclusion in the 4th Industrial Revolution, and nurturing new market leaders.

    Empowering the growth of profiles, leaders, entrepreneurs businesses, and startups on international landscape.

    Asia-Middle East-Europe-North America-Australia-Africa

    Facebook LinkedIn WhatsApp
    Featured Picks

    Why the SEO Game Just Went Into Overdrive

    November 24, 2025

    Social media accounts showing AI-generated women as pro-Trump soldiers, truckers, and cops have gone viral, with thousands appearing to believe they are real (Drew Harwell/Washington Post)

    March 21, 2026

    How to Set Up Your New Android Phone (2025)

    September 1, 2025
    Categories
    • Founders
    • Startups
    • Technology
    • Profiles
    • Entrepreneurs
    • Leaders
    • Students
    • VC Funds
    Copyright © 2024 Timesfeatured.com IP Limited. All Rights.
    • Privacy Policy
    • Disclaimer
    • Terms and Conditions
    • About us
    • Contact us

    Type above and press Enter to search. Press Esc to cancel.