• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Sys & Infrast Lifecycle Mngt 1

Information Technology Audit and Cybersecurity, Temple University

Sys & Infrast Lifecycle Mngt 1

MIS 5203.001 ■ Spring 2020 ■ Wade Mackey
  • Home
  • Syllabus
    • Gradebook
  • Announcements
  • Course Work
    • 1 – Intro/SDLC
    • Planning
      • 2 – Prjct Mngmt & Governance
      • 3 – Business Case & Feasibility
    • Analysis
      • 4 – Requirements Determination
      • 5 – Process Modeling
      • 6 – Data Modeling
      • 7 -Test One
    • Design
      • 10 – HCI (UI)
      • 8 – Database
      • 9 – Software
      • 11 – Test Two
    • Implementation
      • 12 – Architecture
      • 13 – Development & Testing
      • 14 – Migration & Deployment
      • Test 3: Implementation
  • Projects
    • Project 1: Business Case Development
    • Project 2: SDLC
    • Project 3: Systems Design
    • Project 4: Process Re-engineering
    • Project 5: Controls

Malware disguised as security tool targets Ukraine’s IT Army

March 10, 2022 Leave a Comment

Malware disguised as security tool targets Ukraine’s IT Army (bleepingcomputer.com)

Last month, Ukraine announced a new IT army consisting of individuals worldwide working together to conduct cyberattacks and DDoS attacks on Russian entities. However, a spread of threat actors is taking advantage of this by posting fake DDoS tools on Telegram that installs an information-stealing Trojan. Although the legitimate version of the tool is “clean” and illegal to use, it is not possible to check for the malware payload prior to running the tool since neither the legitimate nor the fake tool are digitally signed. Running the malicious tool results in an information-stealing payload executing that steals website data as well as local file information and system information. Although this malware has existed prior to this incident, it has seen a rise as a result of the current world situations.

Kenneth Saltisky

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

RECENT ANNOUNCEMENTS

“School District reports a 334% hike in cybersecurity insurance costs”

A school district in Chicago released details on its cyber-insurance, from … [More...] about “School District reports a 334% hike in cybersecurity insurance costs”

“Security Flaws Seen in China’s Mandatory Olympics App for Athletes”

The article I read this week was from the New York Times, and it describes … [More...] about “Security Flaws Seen in China’s Mandatory Olympics App for Athletes”

“‘Preparation, not panic’: Top US cyber official asks Americans to look out for Russian hacking efforts”

by Sean Lyngaas 3/26/22 To summarize this article, the United States … [More...] about “‘Preparation, not panic’: Top US cyber official asks Americans to look out for Russian hacking efforts”

Cisco Umbrella default SSH key allows theft of admin credentials

Cisco Umbrella default SSH key allows theft of admin credentials … [More...] about Cisco Umbrella default SSH key allows theft of admin credentials

The battle over end-to-end encryption

The BBC article, “The battle over end-to-end encryption, is news to … [More...] about The battle over end-to-end encryption

Hackers Using Device Registration Trick to Attack Enterprise with Lateral Phishing

This article explains the email-based social engineering of criminals to … [More...] about Hackers Using Device Registration Trick to Attack Enterprise with Lateral Phishing

[More Announcements...]

Copyright © 2025 · Department of Management Information Systems · Fox School of Business · Temple University