Good news ! Hackbusters community is waiting for you !
KnowBe4 has been running the HackBusters site for a few years now, providing you with trending IT security news. We are expanding it and have launched a new exciting online community! The forum is divided into four main topics or categories: Social Engineering, Ransomware, Phishing and Security Awareness Training. You are invited to be one of the first to join us at:

Kaspersky’s analysis of servers compromised by Energetic Bear shows the APT operates on behalf of others

Kaspersky analyzed the served compromised by the Energetic Bear APT and assumed with some degree of certainty that the group operates in the interests of or takes orders from customers that are external to it.

Security experts at Kaspersky Lab ICS CERT have published a detailed analysis of the server compromised by the notorious Energetic Bear APT group (Dragonfly and Crouching Yeti) across theyears.

TheEnergetic Bear APT group has been activesince at least 2010 most of the victims of the group are organizations in the energy and industrial sectors.

In March 2018, the Department of Homeland Security and Federal Bureau of Investigationissued a joint technical alertto warn of attacks on US critical infrastructure powered by Russian threat actors. The US-CERT blamed the APT group tracked asDragonfly,Crouching Yeti, andEnergetic Bear.

A week later, theUS-CERT updated itsalertby providing further info that and officially linking the above APT groups to the Kremlin.


View All Trending Stories