Danish Reseller Under Attack by Muscovite Hacking Group

Businesses targeted at the hazard group. The assault shows the Heimdal™ strike. 


Heimdal™ Security Incident Response and Management team has just discovered evidence seeing an anonymous Russian-based hacking group ( Muscovite ) Operating Denmark. The Muscovite team has established brute-force and dictionary-type strikes from 8 different IP addresses, targeting four big operators.



Muscovite Hacking Group also used data accumulated throughout the North American attack to brute-force their own way to the Danish firm's database. Brute-force strikes are among the very effective data-exfiltration procedures. Numbers alone aren't applicable; human experience creates a significant impact on threat-hunting.



Based on the Intel we received from Heimdal™ Security, the email address in question Isn't linked to some of those Most productive cyber-defences. Shows that the key assault IP address was utilized three months back during a sustained assault against a USA-based firm. But, there are inadequate data to support that claim. 


IP address associated with the attack;

IP

No. of hits

45.141.57.18

21155

45.145.67.73

316

193.57.40.29

124

193.106.31.106

110

185.202.0.117

93

195.54.161.6

113

45.145.66.175

56

45.145.67.139

56



The previous surgery could signify the start of a data-gathering stage for a (possible ) business email compromise undermine (B.E.C) effort, writes Heimdal. The IP address used in the U.S. assault was the exact same one intensively utilized during an assault on a North American operator three weeks before.


Previous Post Next Post

Found this article interesting? Follow Hackers Review on Facebook, Twitter  and Telegram to read more exclusive content we post.