ShiftDelete.Net Global

Russian hackers has new method via Google Drive and DropBox!

Ana sayfa / Security

With the advancement of technology, new cyber dimension has been added to wars. So much so that every day new methods of cyber attack is being discovered. In this article, we will explain how Russian hackers make malicious payloads using Google Drive and DropBox.

Cyber ​​security is now an indispensable form of security for Russia and other states. So much so that every state that cares about this issue has its own cyber security armies. Russia is among the prominent states in cyber security wars.

State supported Russian hackers, APT29, use Google Drive and DropBox for spreading malicious payloads

APT29 is also known as Cozy Bear, Cloaked Ursa or The Dukes. APT29 is also known as Cozy Bear, Cloaked Ursa or The Dukes. They strategically provide cybersecurity in favor of the Russian state. In line with these strategic goals, they also carry out cyber attacks.

America’s famous cyber security firm Palo Alto published a research on its official website last tuesday. Palo Alto Unit 42, which published the report, thinks APT29 made a series of attacks between May 2022 and July 2022. The backbone of the report was the malicious payloads methods of Russian hackers.

Contains a link to the HTML file (EnvyScout) in attacks targeting the Portuguese and Brazilian embassies. Hackers entering through this open door targeted the ambassadors’ missions.

Hacker groups: Black, White and Gray Hats!

Hacker groups are basically divided into two: White and Black hats. Black hat hackers are known as malicious hackers and their aim is to infiltrate and damage systems. White hats try not to leave any doors open to keep their systems safe.

Another group is the gray hats, although it is not mentioned much. This hacker group infiltrates systems but does not harm them. They take pleasure in the work they do. There is a high probability that they will become a black hat hacker later on.

How do you think states are protected from cyber security attacks? Please share with us in the comments.

Yorum Ekleyin