Iranian hackers suspected to belong to cyberwarfare group TA455, believed to be part of Charming Kitten, have targeted the aerospace industry by impersonating recruiters on LinkedIn, per ClearSky, an Israeli cybersecurity firm. The hackers, which used SnailResin malware and SlugResin backdoor, previously used by Charming Kitten, employed fake websites and LinkedIn profiles to disseminate malicious files. Meanwhile, other security firms also attributed these files to North Korean cyber spy groups.
China-linked threat actors compromised multiple telecos and spied on a limited number of U.S. government officials
China-associated threat actors breached US broadband providers, accessing the private communications of specific US government officials. This large-scale cyber-espionage operation targeted telecommunications networks to steal