An ongoing cyber espionage campaign targeting Kazakhstan has been attributed to Russia-associated threat actors. Identified as UAC-0063, the group has overlapped activities with APT28, a group associated with the General Staff Main Intelligence Directorate of Russia. The campaign employs legitimate Microsoft Office documents from Kazakhstan’s Ministry of Foreign Affairs as traps for the Double-Tap infection chain, which uses the HATVIBE malware. The attacks have potentially sought intelligence from a number of sectors in Central Asia, East Asia, and Europe.

U.S. Dismantles DanaBot Malware Network, Charges 16 in $50M Global Cybercrime Operation
The U.S. Department of Justice announced punitive action against 16 individuals accused of developing and using DanaBot malware, controlled by a Russian cybercrime organisation. The