A hitherto little-known pro-Assad cyber operations group, the Syrian Malware Team (remote-access-Trojan specialists, apparently), is identified.
Journalists have wondered how North Korea, so wanting in connectivity and reliable electrical power, manages such active cyber operations. A partial answer appears to lie in its use of overseas cells, mostly in China and South Korea.
Banks yesterday saw patterns of card fraud suggesting that Home Depot is the latest retailer to fall victim to a credit-card breach. The big-box home improvement chain is investigating. Observers are already comparing the incident to last year's Target breach.
Apple, investigating the leak of photos from iCloud, says that its security wasn't breached, but that the attacks were "highly targeted," and may have exploited re-used, easily guessed passwords, and security questions whose answers are publicly accessible. But the incident remains under investigation, by both Apple and the FBI. Some observers continue to blame Find My iPhone, iBrute, and the Elcomsoft Phone Password Breaker. (This last is sold internationally as a lawful intercept tool.)
Observers say the JPMorgan hack amounted to "two months of mayhem" until security scans detected the intrusion. RSA joins in calling the episode state-sponsored. NSA Director emeritus Alexander casts a game-theoretic eye on the incident and perceives a possible motive: sending a message that the US financial sector can be held at risk.
Namecheap continues to maintain it's under attack (nota bene, under attack, not breached) by CyberVor.
The Angler exploit kit adds fileless infection to its drive-by capabilities, and thus grows stealthier.