updated Thu. August 15, 2024
-
TechTarget
October 31, 2017
The attackers utilized various methods to gain access to these institutions, though one of the most prevalent attack techniques was a watering hole strategy employed by a group referred to as the Elderwood Gang (Clayton, 2012). The group would spear phish employees to click on links to a website hosting malware thatÃÂ ...
Graham Cluley Security News
July 29, 2015
In the event that their attacks proved successful, the attackers then dropped their own custom malware, including Hurix and Sakurel - both of which are ... According to Symantec, this confirms the existence of the Elderwood Project, a zero-day exploit-sharing framework on which numerous threat actors relyÃÂ ...
The Economist
July 10, 2014
In June American authorities issued charges against the Russian mastermind behind the GameOver Zeus botnet, a sophisticated piece of malware that ... caught security people's attention include Operation Hangover, based in India and focused on Pakistani targets, and the Elderwood Group, a ChineseÃÂ ...
The Guardian
May 19, 2014
"Even though these busts have come a little later than might be expected," he says, "it is not inconceivable to think that information or access gleaned in the author's arrest could have been instrumental in facilitating this coordinated effort." • Is Elderwood the digital arms dealer that fuelled attacks on Google?
Computerworld
May 16, 2014
Further investigation into an exploit kit known as "Elderwood" shows the attackers using it are more numerous and possibly better funded than previously thought, according to new research from Symantec. Elderwood is a hacking platform that has attack code which abuses software vulnerabilities inÃÂ ...
Register
February 27, 2013
Google and other high-tech firms were hit by malware in an attack dubbed Operation Aurora in 2009. Google went public with details of the assault in early 2010, blaming the Elderwood Crew or Beijing Group, another group of hackers allegedly affiliated with the Chinese state's People's Liberation ArmyÃÂ ...
Christian Science Monitor
September 14, 2012
In most cases, Elderwood uses a convincing "spear-phishing" fake e-mail to fool an employee into clicking an infected e-mailed link or into opening a Trojan software-infected attachment that creates a digital backdoor for the cyberspies. In many cases, these attacks have utilized costly "zero-day" malwareÃÂ ...
Ars Technica
September 8, 2012
Perhaps the biggest link is the Elderwood platform. It included a document creation kit that made it easy to bundle specific exploit code and a specific piece of malware and embed it into an otherwise clean document file. Elderwood also included a shared Adobe Flash file that created the precise conditionsÃÂ ...
Computerworld
September 7, 2012
Symantec also laid out its analysis of the gang, which it said was behind a slew of attacks dubbed the "Elderwood Project," after a source code variable ... the way the code in each Trojan was obfuscated, or masked; and the apparent sharing of a single custom-built malware development platform, said Cox.
Ars Technica
June 20, 2012
The exploit allows what's known as a drive-by install: you can become infected simply by visiting a website with Internet Explorer. Alongside last week's regular Patch Tuesday announcement (including a remote code execution vulnerability that is being exploited by attackers in the wild), Microsoft alsoÃÂ ...
TechTarget
October 31, 2017
The attackers utilized various methods to gain access to these institutions, though one of the most prevalent attack techniques was a watering hole strategy employed by a group referred to as the Elderwood Gang (Clayton, 2012). The group would spear phish employees to click on links to a website hosting malware that ...
Graham Cluley Security News
July 29, 2015
In the event that their attacks proved successful, the attackers then dropped their own custom malware, including Hurix and Sakurel - both of which are ... According to Symantec, this confirms the existence of the Elderwood Project, a zero-day exploit-sharing framework on which numerous threat actors rely ...
The Economist
July 10, 2014
In June American authorities issued charges against the Russian mastermind behind the GameOver Zeus botnet, a sophisticated piece of malware that ... caught security people's attention include Operation Hangover, based in India and focused on Pakistani targets, and the Elderwood Group, a Chinese ...
The Guardian
May 19, 2014
"Even though these busts have come a little later than might be expected," he says, "it is not inconceivable to think that information or access gleaned in the author's arrest could have been instrumental in facilitating this coordinated effort." • Is Elderwood the digital arms dealer that fuelled attacks on Google?
Computerworld
May 16, 2014
Further investigation into an exploit kit known as "Elderwood" shows the attackers using it are more numerous and possibly better funded than previously thought, according to new research from Symantec. Elderwood is a hacking platform that has attack code which abuses software vulnerabilities in ...
Register
February 27, 2013
Google and other high-tech firms were hit by malware in an attack dubbed Operation Aurora in 2009. Google went public with details of the assault in early 2010, blaming the Elderwood Crew or Beijing Group, another group of hackers allegedly affiliated with the Chinese state's People's Liberation Army ...
Christian Science Monitor
September 14, 2012
In most cases, Elderwood uses a convincing "spear-phishing" fake e-mail to fool an employee into clicking an infected e-mailed link or into opening a Trojan software-infected attachment that creates a digital backdoor for the cyberspies. In many cases, these attacks have utilized costly "zero-day" malware ...
BetaNews
September 11, 2012
The Hydraq (Aurora) Trojan horse is in the spotlight, courtesy of a hacking group that uses it to wreak havoc with the security of numerous renowned industries. While these hacking maneuvers were pretty high profile and as a result got a lot of coverage, it is the said group's hacking activities, and patterns, ...
Ars Technica
September 8, 2012
Perhaps the biggest link is the Elderwood platform. It included a document creation kit that made it easy to bundle specific exploit code and a specific piece of malware and embed it into an otherwise clean document file. Elderwood also included a shared Adobe Flash file that created the precise conditions ...
Computerworld
September 7, 2012
Symantec also laid out its analysis of the gang, which it said was behind a slew of attacks dubbed the "Elderwood Project," after a source code variable ... the way the code in each Trojan was obfuscated, or masked; and the apparent sharing of a single custom-built malware development platform, said Cox.
ZDNet
July 28, 2015
Black Vine's custom malware has been detected as Hurix and Sakurei -- both ... The framework itself has been dubbed the Elderwood platform.
The Economist
July 10, 2014
... in India and focused on Pakistani targets, and the Elderwood Group, ... Unlike criminals, who typically scatter malware far and wide to infectÃÂ ...
The Guardian
May 19, 2014
The malicious software Blackshades RAT allowed attackers to access victims' computers to access files, copy keystrokes or operate theÃÂ ...
Computerworld
May 16, 2014
Further investigation into an exploit kit known as "Elderwood" shows the attackers using it are more numerous and possibly better funded thanÃÂ ...
Register
February 27, 2013
"Their malware and tools has been built to avoid detection and to ... of the assault in early 2010, blaming the Elderwood Crew or Beijing Group,ÃÂ ...
Christian Science Monitor
September 14, 2012
For example, these experts are now connecting Elderwood and a second ... Elderwood infects these less-secure sites with malware thatÃÂ ...
Ars Technica
September 8, 2012
With their malware inside Google's network, the attackers siphoned source code and ... Perhaps the biggest link is the Elderwood platform.
Wired
September 7, 2012
But the Elderwood gang has used eight zero-days in three years. ... Those in turn were tied to malware used in the Google hack. SymantecÃÂ ...
Ars Technica
June 20, 2012
The exploit allows what's known as a drive-by install: you can become infected simply by visiting a website with Internet Explorer. Alongside lastÃÂ ...
Wired News
January 15, 2010
The attackers used nearly a dozen pieces of malware and several levels of encryption to burrow deeply into the bowels of company networksÃÂ ...