Unmasking State-Sponsored Mobile Surveillance Malware from Russia, China, and North Korea – Threat Actors, Tactics, and Defense Strategies State-sponsored threat actors have expanded their arsenal of surveillance tooling, leaning into mobile malware as a way to acquire information about a target or target group that had otherwise been inaccessible through traditional desktop campaigns. With more than 86% of the worldwide population using a smartphone, attackers have access to the perfect espionage device in the pockets of nearly every potential target. However, APTs from various regions tend to conduct operations in significantly different ways. In this session, we'll explore the landscape of state-sponsored surveillance activity using case studies from Russian, Chinese and North Korean threat actors. We'll discuss their choice of targeting and the different methodologies each employ while introducing several previously unreported malware families that highlight the differences in these state-sponsored operations. By: Kristina Balaam | Senior Staff Security Intelligence Researcher, Lookout Kyle Schmittle | Senior Security Intelligence Researcher, Lookout Alemdar Islamoglu | Senior Staff Security Intelligence Researcher, Lookout Full Abstract and Presentation Materials: https://ift.tt/wNdQ3JY
source https://www.youtube.com/watch?v=AkNzyvGbB50
Subscribe to:
Post Comments (Atom)
-
Android’s May 2024 security update patches 38 vulnerabilities, including a critical bug in the System component. The post Android Update ...
-
Germany recalled its ambassador to Russia for a week of consultations in Berlin following an alleged hacker attack on Chancellor Olaf Scho...
No comments:
Post a Comment