Careto is back: what’s new after 10 years of silence?


During the first week of October, Kaspersky took part in the 34th Virus Bulletin International Conference, one of the longest-running cybersecurity events. There, Kaspersky researchers delivered multiple presentations, and one of our talks focused on newly observed activities by the Careto threat actor, which is also known as “The Mask”.

The Mask APT is a legendary threat actor that has been performing highly sophisticated attacks since at least 2007. Their targets are usually high-profile organizations, such as governments, diplomatic entities and research institutions. To infect them, The Mask uses complex implants, often delivered through zero-day exploits. The last time Kaspersky published their findings about The Mask was in early 2014, and since then, they have been unable to discover any further traces of this actor.

Read more…
Source: Kaspersky


Sign up for our Newsletter


Related:

  • The British Museum says it is partly closed after a fired employee shut down IT systems

    January 25, 2025

    The British Museum, the country’s most popular tourist attraction, was partially closed to the public on Saturday after an employee who had been fired broke in and shut down computer systems, museum management said. The museum in central London, which attracts almost 6 million visitors a year, closed its temporary exhibitions and part of its permanent ...

  • FBI Agents’ Call And Text Logs Potentially Stolen In Data Breach

    January 23, 2025

    The FBI has raised alarm that hackers who breached AT&T’s system last year may have stolen months of agents’ call and text logs, which could potentially lead to the identities of anonymous informants connected to investigations. While the hackers did not access the content of conversations, the stolen call log metadata—records of who called whom, when ...

  • N.B. Liquor stopped attempted cyber attack, CEO says

    January 23, 2025

    N.B. Liquor CEO Lori Stickles says the company’s security systems worked as intended during an attempted cyber attack this month. “We got the alert, we were able to basically put a choke hold on it by shutting our system down proactively,” Stickles said in an interview Thursday. Stickles was unable to provide details on how the ...

  • Dangerous new botnet targets webcams, routers across the world

    January 22, 2025

    Cybersecurity researchers from the Qualys Threat Research Unit have observed a new large-scale operation exploiting vulnerabilities in IP cameras and routers to build out a botnet. In a technical analysis, Qualys said the attackers were mostly exploiting CVE-2017-17215 and CVE-2024-7029, seeking to compromise AVTECH IP cameras, and Huawei HG532 routers. The botnet is essentially Mirai, although ...

  • 7-Zip bug could allow a bypass of a Windows security feature – update now

    January 22, 2025

    A patch is available for a vulnerability in 7-Zip that could have allowed attackers to bypass the Mark-of-the-Web (MotW) security feature in Windows. The MotW is an attribute added to files by Windows when they have been sourced from an untrusted location, like the internet or a restricted zone. The MotW is what triggers warnings that ...

  • Conduent confirms outage was due to a cybersecurity incident

    January 22, 2025

    U.S. government contractor Conduent, which provides technology to support services such as child support and food assistance, has confirmed that a recent outage was caused by a cybersecurity incident. Conduent confirmed the disruption, which left some U.S. residents without access to support payments, to TechCrunch on Tuesday but declined to say whether the outage was related ...