Skip to content
  Tuesday 14 April 2026
Trending
November 22, 2024Schneider Electric PowerLogic PM5300 Series September 29, 2025Cybersecurity Strategy & Policy Advisor June 14, 2024Senior Corporate Counsel – Cybersecurity June 11, 2024Internal Audit – Technology Risk & Cybersecurity, Vice President, New York September 8, 2025<h3>Nullcon Berlin: Spotlight on Cutting-Edge Security Research</h3> October 13, 2024Cybersecurity Engineer/Analyst/Architect June 22, 2025University, Cybersecurity Analyst Intern December 9, 2023Black Hat Europe 2023: A Call for Collaborative Efforts September 1, 2024Fall Intern Cybersecurity Detection Researcher – US Remote April 25, 2024Hitachi Energy MACH SCM | CISA
Mister Cybersecurity
  • Home
  • News
    • Daily Update
    • Industry News
    • Threat Advisories
  • Simulators
    • Exam Simulators
      • CompTIA Security+
      • CompTIA Advanced Security Practitioner (CASP+)
      • Certified Ethical Hacker (CEH)
      • Certified Information Systems Security Professional (CISSP)
      •  Certified Information Systems Auditor (CISA)
      • Certified Information Security Manager (CISM)
      • Systems Security Certified Practitioner (SSCP)
      • GIAC Security Essentials Certification (GSEC)
      • GIAC Certified Incident Handler (GCIH)
      • Offensive Security Certified Professional (OSCP)
    • Training Simulators
      • Blue Team Simulator
      • Red Team Simulator
  • Tools
    • VulnVisor – Vulnerability Explorer
    • Takedown Request Generator
    • Dark Coder – Auto Code Generator
    • SKY VPN
  • Courses
    • SQL Injection Fundamentals with Kali Linux
    • Web Application Hacking
    • Session Hijacking
    • DoS & DDoS Attacks for Beginners
    • Cryptography for Cybersecurity & Hacking
    • Evasion Tactics – IDS, Firewalls & Honeypots
  • Tutorials
    • Security
    • Malware
    • Virus
    • Social Media Security
    • Wireless Security
    • Linux
    • Privacy
    • Windows
      • Windows 11
    • Android
    • iPhone
  • Software
    • Antivirus
    • Android APK
    • Best Free VPN
    • Encryption Tools
    • Hacking Tools
    • Network Utilities
    • Pentesting Tools
    • Themes and Skins
    • Operating Systems
  • More
    • Alternative Sites
    • Cloud Storage
    • Chrome OS
    • Encryption
    • Email Security
    • Ethical Hacking Books
    • Firewall
    • Hacking
    • Web
    • Ransomware
  • Careers
  • Store
  • Account
    • Log In
    • Your Profile
    • Membership Billing
    • Membership Account
Mister Cybersecurity
Mister Cybersecurity
  • Home
  • News
    • Daily Update
    • Industry News
    • Threat Advisories
  • Simulators
    • Exam Simulators
      • CompTIA Security+
      • CompTIA Advanced Security Practitioner (CASP+)
      • Certified Ethical Hacker (CEH)
      • Certified Information Systems Security Professional (CISSP)
      •  Certified Information Systems Auditor (CISA)
      • Certified Information Security Manager (CISM)
      • Systems Security Certified Practitioner (SSCP)
      • GIAC Security Essentials Certification (GSEC)
      • GIAC Certified Incident Handler (GCIH)
      • Offensive Security Certified Professional (OSCP)
    • Training Simulators
      • Blue Team Simulator
      • Red Team Simulator
  • Tools
    • VulnVisor – Vulnerability Explorer
    • Takedown Request Generator
    • Dark Coder – Auto Code Generator
    • SKY VPN
  • Courses
    • SQL Injection Fundamentals with Kali Linux
    • Web Application Hacking
    • Session Hijacking
    • DoS & DDoS Attacks for Beginners
    • Cryptography for Cybersecurity & Hacking
    • Evasion Tactics – IDS, Firewalls & Honeypots
  • Tutorials
    • Security
    • Malware
    • Virus
    • Social Media Security
    • Wireless Security
    • Linux
    • Privacy
    • Windows
      • Windows 11
    • Android
    • iPhone
  • Software
    • Antivirus
    • Android APK
    • Best Free VPN
    • Encryption Tools
    • Hacking Tools
    • Network Utilities
    • Pentesting Tools
    • Themes and Skins
    • Operating Systems
  • More
    • Alternative Sites
    • Cloud Storage
    • Chrome OS
    • Encryption
    • Email Security
    • Ethical Hacking Books
    • Firewall
    • Hacking
    • Web
    • Ransomware
  • Careers
  • Store
  • Account
    • Log In
    • Your Profile
    • Membership Billing
    • Membership Account
Mister Cybersecurity
  Industry News  Taiwanese Companies and the U.S. Military Face Assault
Industry News

Taiwanese Companies and the U.S. Military Face Assault

Mister CybersecurityMister Cybersecurity—August 21, 20230
FacebookTwitterPinterestLinkedInTumblrRedditVKWhatsAppEmail



The HiatusRAT malware, which had beforehand focused Latin America and Europe, has returned with a brand new wave of assaults concentrating on organizations in Taiwan and a U.S. navy procurement system. The attackers have recompiled malware samples for various architectures and are utilizing new digital non-public servers. The exercise cluster is described as audacious and exhibits no indicators of slowing down. The id and origin of the menace actors are unknown. The targets embrace semiconductor and chemical producers in Taiwan, in addition to a U.S. Department of Defense server.

HiatusRAT was first found in July 2022 and contaminated as many as 100 edge networking gadgets globally. The newest assaults, noticed from mid-June to August 2023, use pre-built HiatusRAT binaries for varied architectures. Most of the connections to the server internet hosting the malware originate from Taiwan. The attackers use Tier 1 servers to commandeer payload and reconnaissance servers that talk with the sufferer networks.

The attackers have been recognized utilizing two totally different IP addresses to connect with the DoD server for a interval of two hours. It just isn’t clear what their finish purpose is, however it’s suspected that they have been searching for publicly obtainable info associated to navy contracts for future concentrating on. The concentrating on of perimeter belongings, akin to routers, has grow to be a sample, with menace actors related to China exploiting safety flaws in unpatched home equipment. The menace actor behind HiatusRAT has made minimal adjustments to their infrastructure regardless of prior disclosures of their instruments and capabilities.



Source hyperlink

FacebookTwitterPinterestLinkedInTumblrRedditVKWhatsAppEmail

Mister Cybersecurity

WoofLocker Toolkit Conceals Malicious Codes in Images for Tech Support Scams
Thousands of Hacked Windows and macOS PCs Transformed into Proxy Servers by Malicious Software
Related posts
  • Related posts
  • More from author
Industry News

AI Is Transforming EDI Compliance Services

March 27, 20260
Industry News

5 Reasons AI-Driven Business Need Dedicated Servers – SmartData Collective

October 14, 20250
Industry News

The Future of Cyberthreat Sharing Post-CISA 2015: What’s Next?

October 1, 20250
Load more
Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Read also
Threat Advisories

CISA Adds Two Known Exploited Vulnerabilities to Catalog

April 14, 20260
Careers

Lead Cybersecurity WAF Engineer

April 14, 20260
Careers

Senior Manager, Cybersecurity Detection Engineering

April 14, 20260
Careers

Lead Cybersecurity WAF Engineer

April 14, 20260
Careers

Lead Cybersecurity WAF Engineer

April 14, 20260
Careers

Lead Cybersecurity WAF Engineer

April 14, 20260
Load more
Stay Social!
192Likes
4,500Followers
13Subscribers
46Followers
Recent posts
  • CISA Adds Two Known Exploited Vulnerabilities to Catalog
  • Lead Cybersecurity WAF Engineer
  • Senior Manager, Cybersecurity Detection Engineering
  • Lead Cybersecurity WAF Engineer
  • Lead Cybersecurity WAF Engineer

    # TRENDING

    how old is my computerhow old is my dell laptophow old is my HP laptophow old is my laptophow old is my toshiba laptophow to find computer ageverify computer agestar wars theme wallpapersThe Best Hacking Bookswiresharkusb device not found windows 10/11usb device not recognized windows 10/11 errorWhat is AIGPUSnifferuTorrentvulnerability scanner downloadWifi Hacking SoftwareWifi Hacking Appsolved windows 10/11 usb device not recognizedstar wars windows 7 theme downloadTwitter Account Security
    © Copyright Mister Cybersecurity LLC 2023, All Rights Reserved
    • About
    • Contact
    • Privacy
    • ToS
    • Disclosures