Netcrook Logo

Tag: Cyber-Espionage

79 article(s)

APT37’s Social Media Espionage: North Korean Hackers Target Defense with Facebook and Trojanized Software

13 Apr 2026 news 🌍 Asia

APT37 is using Facebook and Telegram to lure defense sector targets into downloading trojanized software, enabling covert data theft via cloud services. Their evolving tactics blend social engineering with technical stealth, making detection harder than ever.

#APT37 | #Cyber-espionage | #Social engineering

Behind the Firewall: How China’s APT31 Quietly Hacked Russia’s Tech Sector

12 Apr 2026 news 🌍 Europe

APT31, a Chinese state-sponsored hacker group, infiltrated Russian IT supply chains for years, stealing sensitive data and exposing the fragile trust at the heart of the Sino-Russian alliance.

#APT31 | #cyber-espionage | #Sino-Russian relations

ProSpy Unmasked: Hack-for-Hire Espionage Hits Middle East Through Fake Messaging Apps

10 Apr 2026 news

Mercenary hackers have unleashed ProSpy spyware across the Middle East, using fake secure messaging apps to infiltrate the devices of journalists and activists. This investigation unpacks the methods and implications of the hack-for-hire campaign.

#ProSpy | #Cyber-espionage | #Middle East

Shadow Play: Inside the RoningLoader Cyber-Espionage Campaign

09 Apr 2026 news 🌍 Asia

DragonBreath’s RoningLoader campaign is redefining stealth attacks by abusing legitimate Windows tools. Learn how DLL side-loading, code injection, and ‘living off the land’ tactics evade detection—and how new simulation platforms help defenders keep up.

#Cyber-espionage | #RoningLoader | #DragonBreath

Stealth in the Shadows: APT28’s PRISMEX Malware Campaign Hits Ukraine and NATO

08 Apr 2026 news 🌍 Europe

Russian hacking group APT28 has launched a sophisticated PRISMEX malware campaign against Ukraine and NATO, exploiting zero-days and advanced stealth tactics to compromise vital sectors and threaten both espionage and sabotage.

#APT28 | #PRISMEX | #Cyber-espionage

North Korean Hackers Poison Open-Source Software Repositories in Massive Supply Chain Attack

08 Apr 2026 news 🌍 Asia

A sweeping North Korean cyber campaign has planted over 1,700 malicious packages across npm, PyPI, Go, Rust, and PHP, targeting developers with stealthy malware. The Contagious Interview operation marks a new escalation in supply chain threats, blending technical cunning with social engineering to compromise software at its source.

#North Korean hackers | #open-source attack | #cyber-espionage

How the FBI Disrupted a Russian Router Espionage Operation

08 Apr 2026 news 🌍 Europe

The FBI has dismantled a Russian intelligence operation that secretly hijacked home and office routers to spy on high-value targets. Learn how the attack worked and how to protect your devices.

#FBI | #Russian Hackers | #Cyber-Espionage

🏴‍☠️ Handala Hacktivists Leak Israeli Analyst’s Private Chats in Ransomware Escalation

08 Apr 2026 news 🌍 Middle-East

In a bold move, hacktivist group Handala has published the private chats of Israeli security analyst Raz Zimmt, marking a new chapter in politically motivated cyber-espionage. Here’s what happened—and what it means for digital security.

#Handala | #cyber-espionage | #Raz Zimmt

Inside the Panda’s Den: TA416’s Sophisticated PlugX Espionage Hits Europe

03 Apr 2026 news

TA416, a China-linked threat group, is back with advanced PlugX malware and OAuth-based phishing, targeting European and Middle Eastern governments in a new wave of cyber-espionage.

#TA416 | #cyber-espionage | #PlugX

Kimsuky’s Evolving LNK Attacks: Multi-Stage Malware and Python Backdoors Exposed

03 Apr 2026 news 🌍 Asia

Kimsuky’s new attack chain breaks malware delivery into modular stages, abusing Windows shortcuts, cloud storage, and Python to slip past security. Learn how the North Korean threat group’s evolving tactics challenge defenders.

#Kimsuky | #Python backdoor | #cyber-espionage