www.volexity.com Open in urlscan Pro
104.26.7.38  Public Scan

URL: https://www.volexity.com/blog/tag/japan/
Submission: On May 23 via api from US — Scanned from DE

Form analysis 1 forms found in the DOM

GET https://www.volexity.com/

<form role="search" method="get" class="search-form" action="https://www.volexity.com/">
  <label>
    <span class="screen-reader-text">Search for:</span>
    <input type="search" class="search-field placeholder-text" placeholder="SEARCH" value="" name="s" title="Search for:">
  </label>
  <input type="submit" class="search-submit" value="Search">
</form>

Text Content

 * Request A Demo

 * Breach Assistance

 * Products
   * Products Overview
   * Volcano
   * Surge
 * Services
   * Services Overview
   * Incident Response
   * Network Security Monitoring
   * Proactive Threat Assessments
   * Threat Intelligence
   * M&A Cybersecurity Assessments
 * Company
   * About
   * News & Press
   * Careers
   * Internships
   * Resources
 * Blog
 * Contact


archive

JAPAN


 1. VIRTUAL PRIVATE KEYLOGGING: CISCO WEB VPNS LEVERAGED FOR ACCESS AND
    PERSISTENCE
    
    October 7, 2015
    
    by Volexity
    
    In the world of information security, there is never a dull moment. Part of
    the fun of working in this space is that you always get to see attackers do
    something new or put a new spin on something old. Last month at the CERT-EU
    Conference in Brussels, Belgium, Volexity gave a presentation on a recent
    evolution in how attackers are maintaining persistence within victim
    networks. The method, which involves modifying the login pages to Cisco
    Clientless SSL VPNs (Web VPN), is both novel and surprisingly obvious at the
    same time. Attackers have been able to successfully implant JavaScript code
    on the login pages that enables them to surreptitiously steal employee
    credentials as they login to access internal corporate resources. Whether
    you are proactively monitoring your network or reactively undergoing an
    incident response, one of the last places you might examine for backdoors
    are your firewalls and VPN gateway appliances. […]
    
    Read More


 2. DEMOCRACY IN HONG KONG UNDER ATTACK
    
    October 9, 2014
    
    by Volexity
    
    Over the last few months, Volexity has been tracking a particularly
    remarkable advanced persistent threat (APT) operation involving strategic
    web compromises of websites in Hong Kong and Japan. In both countries, the
    compromised websites have been particularly notable for their relevance to
    current events and the high profile nature of the organizations involved. In
    particular the Hong Kong compromises appear to come on the heels of the
    Occupy Central Campaign shifting into high gear. These compromises were
    discovered following the identification of malicious JavaScript that had
    been added to legitimate code on the impacted websites. This code meant that
    visitors were potentially subjected to exploit and malicious Java Applets
    designed to install malware on their systems. While investigating these
    cases, Volexity also discovered additional APT attack campaigns involving
    multiple other pro-democratic websites in Hong Kong. These attempts at
    exploitation, compromise, and digital surveillance are detailed throughout
    this post. Compromised Pro-Democratic […]
    
    Read More


 * Search for:

 * RECENT POSTS
   
    * Storm Cloud on the Horizon: GIMMICK Malware Strikes at macOS
    * Operation EmailThief: Active Exploitation of Zero-day XSS Vulnerability in
      Zimbra
    * XE Group – Exposed: 8 Years of Hacking & Card Skimming for Profit
    * North Korean BLUELIGHT Special: InkySquid Deploys RokRAT
    * North Korean APT InkySquid Infects Victims Using Browser Exploits

 * ARCHIVES
   
    * March 2022
    * February 2022
    * December 2021
    * August 2021
    * May 2021
    * March 2021
    * December 2020
    * November 2020
    * April 2020
    * March 2020
    * September 2019
    * November 2018
    * September 2018
    * August 2018
    * July 2018
    * June 2018
    * April 2018
    * November 2017
    * July 2017
    * March 2017
    * November 2016
    * October 2015
    * July 2015
    * June 2015
    * April 2015
    * October 2014
    * September 2014

 * TAGS
   
   osx crimeware malware vulnerabilities digital surveillance solarwinds China
   Japan Storm Cloud Exploit Drupal APT exploits Exchange spear phishing
   Scanning mac OceanLotus Dukes Vietnam

© 2022 Volexity. All Rights Reserved.
 * About
   * About Us
   * Blog
   * Privacy Policy
 * Solutions
   * Request A Demo
   * Products
   * Services

Contact

 * 11654 Plaza America Dr #774
   Reston, VA 20190-4700
 * 1-888-825-1975

Connect

 * 
 * 
 * 


This Website uses cookies, which are necessary to its functioning and required
to achieve the purposes illustrated in our Cookie Policy. By clicking the
button, you consent to our use of cookies.Agree & Close