Cyber Intelligence

Linkedin
  • News
    • Aerospace
    • Apple
    • Arrest
    • Automotive
    • Big Tech
    • Breaking News
    • Business Email Compromise
    • China
    • Chip Technology
    • Cryptocurrency
    • Cyber Budget
    • Cyber Espionage
    • Cyber M&A
    • cybercrime
    • Data Leak
    • deepfake
    • Energy Sector
    • Ethiopia
    • Finance
    • France
    • Geopolitics
    • Government
    • Hacktivism
    • Healthcare
    • Human Error
    • Investment Scam
    • Iran
    • Israel Conflict
    • Malicious Bots
    • Malware
    • North Korea
    • Norton
    • One Minute Roundup
    • ransomware
    • SEC
    • SMB
    • Social Media
    • Sri Lanka
    • Taiwan
    • VPN
    • Wire Fraud
    • Workforce Cyber
  • Analysis
  • Expert Opinions
  • Resources
    • Conferences
    • Glossary of terms
    • Awards
    • Ecosystem map
Reading: Unknown threat actor targets the US Red Cross
Share
Cyber IntelligenceCyber Intelligence
Aa
  • News
  • Analysis
  • Expert Opinions
  • Resources
Search
  • News
    • Aerospace
    • Apple
    • Arrest
    • Automotive
    • Big Tech
    • Breaking News
    • Business Email Compromise
    • China
    • Chip Technology
    • Cryptocurrency
    • Cyber Budget
    • Cyber Espionage
    • Cyber M&A
    • cybercrime
    • Data Leak
    • deepfake
    • Energy Sector
    • Ethiopia
    • Finance
    • France
    • Geopolitics
    • Government
    • Hacktivism
    • Healthcare
    • Human Error
    • Investment Scam
    • Iran
    • Israel Conflict
    • Malicious Bots
    • Malware
    • North Korea
    • Norton
    • One Minute Roundup
    • ransomware
    • SEC
    • SMB
    • Social Media
    • Sri Lanka
    • Taiwan
    • VPN
    • Wire Fraud
    • Workforce Cyber
  • Analysis
  • Expert Opinions
  • Resources
    • Conferences
    • Glossary of terms
    • Awards
    • Ecosystem map

Cyber Intelligence

Linkedin
  • News
    • Aerospace
    • Apple
    • Arrest
    • Automotive
    • Big Tech
    • Breaking News
    • Business Email Compromise
    • China
    • Chip Technology
    • Cryptocurrency
    • Cyber Budget
    • Cyber Espionage
    • Cyber M&A
    • cybercrime
    • Data Leak
    • deepfake
    • Energy Sector
    • Ethiopia
    • Finance
    • France
    • Geopolitics
    • Government
    • Hacktivism
    • Healthcare
    • Human Error
    • Investment Scam
    • Iran
    • Israel Conflict
    • Malicious Bots
    • Malware
    • North Korea
    • Norton
    • One Minute Roundup
    • ransomware
    • SEC
    • SMB
    • Social Media
    • Sri Lanka
    • Taiwan
    • VPN
    • Wire Fraud
    • Workforce Cyber
  • Analysis
  • Expert Opinions
  • Resources
    • Conferences
    • Glossary of terms
    • Awards
    • Ecosystem map
Reading: Unknown threat actor targets the US Red Cross
Share
Have an existing account? Sign In
Follow US
© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.
AnalysiscybercrimeHealthcare

Unknown threat actor targets the US Red Cross

Tony Glover
October 1, 2023 at 7:11 AM
By Tony Glover Tony Glover
Share
American Red Cross
LAS VEGAS, NEVADA - MARCH 27: American Red Cross employee Darryl Thompson Jr. sanitizes a blood bed during an American Red Cross blood drive to help alleviate a blood supply shortage as a result of the coronavirus pandemic at Las Vegas Motor Speedway on March 27, 2020 in Las Vegas, Nevada. The speedway plans to hold a total of four blood drives due to a lack of donated blood and facilities large enough to collect it while observing social distancing guidelines. Many blood drives across the United States have been canceled as a result of the spread of the virus. The World Health Organization declared the coronavirus (COVID-19) a global pandemic on March 11th. (Photo by Ethan Miller/Getty Images)
SHARE
American Red Cross
(Photo by Ethan Miller/Getty Images)

The cyber-war just got dirtier. A year or two back, an age in cyber-years, even the most ruthless cyber-gangs avoided attacking medical facilities to create a better public image in the eyes of the hacker community. Their stance has weakened somewhat since then, with attacks on the health sector becoming more common. But a recent attack on the US Red Cross is unusual enough to ring alarm bells outside the cybersecurity community.

While conducting their daily threat-hunting operations, cybersecurity firm NSFOCUS Security Labs very recently discovered a new attack process they had never seen previously. Intrigued, they discovered two new so-called “Trojan horse” programs designed to slip under the radar of known cybersecurity defenses.

 “This attacker is quite different from known attacker characteristics in terms of the execution flow, attack technology stack, attack tools, implementation details, attack objectives, behavior tendency, and other main attribution indicators. The technical level and cautious attitude shown by this attacker during this activity are also worthy of attention,” reports NSFOCUS Security Labs.

No clue as to the attacker’s identity

Cybersecurity intelligence operatives can typically identify specific criminal gangs by their techniques and the software they deploy. But in this case, the researchers could not find anything to link the attack with any known cybercriminal group. With no clue to the attacker’s identity, the cybersecurity firm decided to name the threat actor “AtlasCross.”

AtlasCross designed a decoy document titled “Blood Drive September 2023.docm” with the United States Red Cross blood donation information as its topic. If the victim follows the prompt to enable macro functionality, the decoy document will display the hidden content. The hidden content is a promotional file of the United States Red Cross blood donation service, which contains a malicious code intended to siphon off the victim’s personal data. The effect of this crime is twofold as far as the Red is concerned. It deters US citizens from contacting the Red Cross, and it also causes the Red Cross significant reputational damage.

While the Red Cross scam may have been executed in a basement cellar by a solitary criminal genius, the level of skill and professionalism and the level of new software used in the crime point to another possibility. Potentially hostile nation-states such as China have been conducting well-orchestrated cyber campaigns to weaken critical Western infrastructure. Academia, aerospace, defense, government, media, telecoms, and research have all been targeted by China-backed hackers in the US, Europe, and Asia.

Given that blood-transfusion supplies can be as vital to a military conflict or state of emergency as bullets or power, organizations like the Red Cross may increasingly find themselves in the firing line from nation-state-backed cybercriminals bent on weakening the West’s critical infrastructure.

TAGGED: atlascross, china, cyber espionage, cyberattack, cybercriminals, Cybersecurity, healthcare, medical, nsfocus security labs, trojan horse, us red cross
Tony Glover October 13, 2023 October 1, 2023
Share This Article
Twitter LinkedIn Email Copy Link Print
Previous Article The Daily Decrypt - One Minute Roundup Budworm Group Targets Middle Eastern Telco Company – September 29th
Next Article The Daily Decrypt - One Minute Roundup New malware payload evades detection – October 2nd
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Editor's Pick

You Might Also Like

NewsOne Minute RoundupOne Minute Roundup

UK backs AI and intelligence modernization – June 12th

The UK government has announced its plans to invest in digital and artificial intelligence (AI) in public services, including the NHS, aiming to build strong technology foundations and tackle urgent cybersecurity risks.

June 12, 2025
NewsOne Minute RoundupOne Minute Roundup

Cyera secures $540 million in funding – June 11th

Cybersecurity firm Cyera has raised $540 million in a Series E funding round, bringing its total to over $1.3 billion. Cyera’s valuation has surged to $6 billion in six months, reporting a 353 percent year-over-year growth. 

June 11, 2025
One Minute RoundupOne Minute Roundup

Honeywell kicks off AI tools to accelerate industrial autonomy – June 10th

Honeywell has debuted a series of AI-powered tools that intend to boost industrial autonomy, introducing a suite of AI cybersecurity solutions designed to ramp up Operation Technology defenses against the ever-evolving cyberthreat landscape.

June 10, 2025
cybercrimeNewsransomwareRussia

Teenage hackers run rings around cyber-defenses

The recent UK retail cyberattacks that impacted Marks & Spencer and the Co-Op supermarket chain are only the tip of a very large iceberg that now threatens organizations on both sides of the Atlantic. Although media reports have attributed the attacks to a group named “Scattered Spider,” the actual threat is far bigger. For a start, there is no criminal group that actually calls itself “Scattered Spider”, which is just a made-up name attributed by cybersecurity researchers. These attacks and many others in the US and the UK are now known to be the work of a vast sprawling network of hackers, some as young as 14, spread across the US and the UK. They call themselves “the Community”, or “the Com” for short, and are essentially a vast teenage subculture of criminal hackers.

June 10, 2025

Cyber Intelligence

We provide in-depth analysis, breaking news, and interviews with some of the leading minds in cybersecurity and distill critical insights that matter to our readers. Daily.

Linkedin

Category

  • Cybercrime
  • News

Quick Links

  • News
    • Aerospace
    • Apple
    • Arrest
    • Automotive
    • Big Tech
    • Breaking News
    • Business Email Compromise
    • China
    • Chip Technology
    • Cryptocurrency
    • Cyber Budget
    • Cyber Espionage
    • Cyber M&A
    • cybercrime
    • Data Leak
    • deepfake
    • Energy Sector
    • Ethiopia
    • Finance
    • France
    • Geopolitics
    • Government
    • Hacktivism
    • Healthcare
    • Human Error
    • Investment Scam
    • Iran
    • Israel Conflict
    • Malicious Bots
    • Malware
    • North Korea
    • Norton
    • One Minute Roundup
    • ransomware
    • SEC
    • SMB
    • Social Media
    • Sri Lanka
    • Taiwan
    • VPN
    • Wire Fraud
    • Workforce Cyber
  • Analysis
  • Expert Opinions
  • Resources
    • Conferences
    • Glossary of terms
    • Awards
    • Ecosystem map

© 2023 Cyberintel.media

Welcome Back!

Sign in to your account

Lost your password?