2019-9-25 16:02 |
Notorious threat actors like Potao Express, BlackEnergy and Turla account for as many as 79 unique malware families that have been used to infiltrate European government and military computers and target “high-value” entities across Ukraine, Russia, Georgia, and Belarus for information harvesting.
The findings come from a map put together by Check Point Research and genetic malware analysis firm Intezer, making it first-ever comprehensive analysis of state-backed Russian-attributed threat groups that have been found to engage in disruptive cyber warfare. “The size of the resource investment and the way the Russians are organizing themselves in silos makes them able to carry out…
This story continues at The Next Web
.
Similar to Notcoin - Blum - Airdrops In 2024