Article 4F1T7 Bluetooth harvester signals hacking group’s growing interest in mobile

Bluetooth harvester signals hacking group’s growing interest in mobile

by
Dan Goodin
from Ars Technica - All content on (#4F1T7)
bluetoothpairedbutnotconnected7-800x582.

Enlarge (credit: ybierling.com)

A Korean-speaking hacking group in operation since at least 2016 is expanding its arsenal of hacking tools to include a Bluetooth-device harvester in a move that signals the group's growing interest in mobile devices.

ScarCruft is a Korean-speaking advanced persistent threat group that researchers with security firm Kaspersky Lab have been following since at least 2016. At the time, the group was found using at least four exploits, including an Adobe Flash zeroday, to infect targets located in Russia, Nepal, South Korea, China, India, Kuwait, and Romania.

In a post published Monday, Kaspersky Lab researchers said they discovered a custom Bluetooth-device harvester created by ScarCruft. The researchers wrote:

Read 6 remaining paragraphs | Comments

index?i=rK7IjImyLxA:cAgZQLrxxNc:V_sGLiPB index?i=rK7IjImyLxA:cAgZQLrxxNc:F7zBnMyn index?d=qj6IDK7rITs index?d=yIl2AUoC8zA
External Content
Source RSS or Atom Feed
Feed Location http://feeds.arstechnica.com/arstechnica/index
Feed Title Ars Technica - All content
Feed Link https://arstechnica.com/
Reply 0 comments