An ongoing cyber espionage campaign targeting Kazakhstan has been attributed to Russia-associated threat actors. Identified as UAC-0063, the group has overlapped activities with APT28, a group associated with the General Staff Main Intelligence Directorate of Russia. The campaign employs legitimate Microsoft Office documents from Kazakhstan’s Ministry of Foreign Affairs as traps for the Double-Tap infection chain, which uses the HATVIBE malware. The attacks have potentially sought intelligence from a number of sectors in Central Asia, East Asia, and Europe.

The NHS needs to tighten its third-party supplier cybersecurity
The NHS should proactively fortify cybersecurity within its third-party software suppliers following recent damaging ransomware attacks, says Jonathan Lee from Trend Micro. He suggests implementing