State-run hacker group Lazarus is utilizing new malware, CookiePlus, to maintain ongoing access to victims’ systems, according to Kaspersky. Originally targeting crypto firms, the group’s Operation DreamJob campaign, which has been ongoing for five years, now also attacks IT, defense, and nuclear companies. CookiePlus disguises itself as an open-source plug-in, collects system data, and adjusts execution schedules, allowing Lazarus to steal sensitive data undetected over extended periods.
DataBreaches.Net: Ohio State Auditor Provided Email Scam Guidance in April, Employees May be Held Accountable for Falling for Scams
Bloody ‘ell, mates! You won’t believe what’s been happening over in Ohio. There’s a bit of a kerfuffle in the local government circuit. Seems like