Kaspersky Lab warns that North Korea’s Lazarus Group, APT38, has recently grown subtler and more evasive, showing greater facility at misdirection. Increased sophistication has followed the group’s Operation AppleJeus, the Lazarus Group’s first sustained effort against macOS targets, but it's also evident in operations against Windows systems. The Lazarus Group has recently been active against the cryptocurrency sector. Most of its victims, chosen opportunistically, have been in the UK, Poland, Russia, and China. Recorded Future describes how Pyongyang has adapted the Internet into a tool for rogue regimes.
The NetBlocks Internet Observatory reported Saturday that Iran sustained a large distributed denial-of-service attack. The Financial Tribune quotes authorities as saying that they successfully parried the attack, and that they were unable to attribute the incident to any nation-state actor. Forbes writes that 25% of Iran’s Internet became unavailable after Iran activated its “Digital Fortress” defenses, which impose their own penalty on connectivity.
Nevada Democratic Party officials told the Nevada Independent Thursday that Iowa's unfortunate caucus experience last week led them to decide against using mobile applications for their caucus. But that may not be entirely the case: Saturday the Nevada Independent also reported that precinct leaders were receiving iPads with a preloaded tool they would use to assist them with their “viability calculations.” The Wall Street Journal isn’t particularly optimistic about Nevada Democrats' preparations, describing them as "cobbled together."
Haaretz reports that Israel's Likud Party's unsecured Elector app uploaded and leaked "names, identification numbers and addresses" of more than six-million voters.