Malware

Clean links and sophisticated scams mark new era in email attacks

Clean links and sophisticated scams mark new era in email attacks 2024-02-20 at 06:05 By Help Net Security Analysis of 7 billion emails shows clean links are duping users, malicious EML attachments increased 10-fold in Q4, and social engineering attacks are at all-time highs, according to VIPRE Security. The rise of the EML file attachments […]

React to this headline:

Loading spinner

Clean links and sophisticated scams mark new era in email attacks Read More »

Ukrainian Raccoon Infostealer Operator Extradited to US

Ukrainian Raccoon Infostealer Operator Extradited to US 2024-02-19 at 17:17 By Ionut Arghire Alleged Raccoon Infostealer operator Mark Sokolovsky is awaiting trial in the US, after being extradited from the Netherlands. The post Ukrainian Raccoon Infostealer Operator Extradited to US appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS Feed View Original

React to this headline:

Loading spinner

Ukrainian Raccoon Infostealer Operator Extradited to US Read More »

Ukrainian Pleads Guilty in US to Key Role in Zeus, IcedID Malware Operations

Ukrainian Pleads Guilty in US to Key Role in Zeus, IcedID Malware Operations 2024-02-16 at 12:31 By Eduard Kovacs Ukrainian national Vyacheslav Igorevich Penchukov has pleaded guilty to holding key roles in the Zeus and IcedID malware operations. The post Ukrainian Pleads Guilty in US to Key Role in Zeus, IcedID Malware Operations appeared first

React to this headline:

Loading spinner

Ukrainian Pleads Guilty in US to Key Role in Zeus, IcedID Malware Operations Read More »

iOS users beware: GoldPickaxe trojan steals your facial data

iOS users beware: GoldPickaxe trojan steals your facial data 2024-02-15 at 12:16 By Help Net Security Group-IB uncovered a new iOS trojan designed to steal users’ facial recognition data, identity documents, and intercept SMS. The trojan, dubbed GoldPickaxe.iOS by Group-IB’s Threat Intelligence unit, has been attributed to a Chinese-speaking threat actor codenamed GoldFactory, responsible for

React to this headline:

Loading spinner

iOS users beware: GoldPickaxe trojan steals your facial data Read More »

Understanding the tactics of stealthy hunter-killer malware

Understanding the tactics of stealthy hunter-killer malware 2024-02-15 at 06:31 By Help Net Security Picus Security has revealed a rise in hunter-killer malware, highlighting a significant shift in adversaries’ capability to pinpoint and thwart advanced enterprise defenses, including next-gen firewalls, antivirus programs, and EDR systems. There was a 333% increase in malware that can actively

React to this headline:

Loading spinner

Understanding the tactics of stealthy hunter-killer malware Read More »

Ransomware tactics evolve, become scrappier

Ransomware tactics evolve, become scrappier 2024-02-12 at 07:02 By Help Net Security As we enter 2024, ransomware remains the most significant cyberthreat facing businesses, according to Malwarebytes. Malwarebytes reveals that the United States accounted for almost half of all ransomware attacks in 2023. “Small and medium-sized organizations face a deluge of cyber threats daily including

React to this headline:

Loading spinner

Ransomware tactics evolve, become scrappier Read More »

As-a-Service tools empower criminals with limited tech skills

As-a-Service tools empower criminals with limited tech skills 2024-02-08 at 06:01 By Help Net Security As-a-service attacks continue to dominate the threat landscape, with Malware-as-a-Service (MaaS) and Ransomware-as-a-Service (RaaS) tools making up the majority of malicious tools in use by attackers, according to Darktrace. Cybercriminals exploit as-a-Service tools As-a-Service tools can provide attackers with everything

React to this headline:

Loading spinner

As-a-Service tools empower criminals with limited tech skills Read More »

Chinese hackers breached Dutch Ministry of Defense

Chinese hackers breached Dutch Ministry of Defense 2024-02-07 at 16:46 By Helga Labus Chinese state-sponsored hackers have breached the Dutch Ministry of Defense (MOD) last year and deployed a new remote access trojan (RAT) malware to serve as a backdoor. “The effects of the intrusion were limited because the victim network was segmented from the

React to this headline:

Loading spinner

Chinese hackers breached Dutch Ministry of Defense Read More »

Doppelganger Dilemma: New XPhase Clipper’s Proliferation via Deceptive Crypto Sites and Cloned YouTube Videos

Doppelganger Dilemma: New XPhase Clipper’s Proliferation via Deceptive Crypto Sites and Cloned YouTube Videos 2024-02-07 at 13:17 By neetha871ad236bd Key Takeaways  Overview  CRIL has identified a malware campaign aimed at cryptocurrency users. In this campaign, Threat Actors (TA) employed deceptive websites masquerading as legitimate cryptocurrency applications. Notably, we encountered several phishing sites targeting users of

React to this headline:

Loading spinner

Doppelganger Dilemma: New XPhase Clipper’s Proliferation via Deceptive Crypto Sites and Cloned YouTube Videos Read More »

FritzFrog botnet exploits Log4Shell, PwnKit vulnerabilities

FritzFrog botnet exploits Log4Shell, PwnKit vulnerabilities 2024-02-01 at 17:31 By Helga Labus The FritzFrog cryptomining botnet has new potential for growth: a recently analyzed variant of the bot is exploiting the Log4Shell (CVE-2021-44228) and PwnKit (CVE-2021-4034) vulnerabilities for lateral movement and privilege escalation. The FritzFrog botnet The FritzFrog botnet, initially identified in August 2020, is

React to this headline:

Loading spinner

FritzFrog botnet exploits Log4Shell, PwnKit vulnerabilities Read More »

Threat actor used Vimeo, Ars Technica to serve second-stage malware

Threat actor used Vimeo, Ars Technica to serve second-stage malware 2024-02-01 at 12:31 By Zeljka Zorz A financially motivated threat actor tracked as UNC4990 is using booby-trapped USB storage devices and malicious payloads hosted on popular websites such as Ars Technica, Vimeo, GitHub and GitLab to surreptitiously deliver malware. Another interesting detail about UNC4990 it’s

React to this headline:

Loading spinner

Threat actor used Vimeo, Ars Technica to serve second-stage malware Read More »

Greenbean: Latest Android Banking Trojan Leveraging Simple RealTime Server (SRS) for C&C Communication

Greenbean: Latest Android Banking Trojan Leveraging Simple RealTime Server (SRS) for C&C Communication 2024-02-01 at 08:17 By neetha871ad236bd Cyble analyzes GreenBean, a new Android Banking Trojan leveraging Simple RealTime Server (SRS) for C&C Communication The post Greenbean: Latest Android Banking Trojan Leveraging Simple RealTime Server (SRS) for C&C Communication appeared first on Cyble. The post

React to this headline:

Loading spinner

Greenbean: Latest Android Banking Trojan Leveraging Simple RealTime Server (SRS) for C&C Communication Read More »

Free ransomware recovery tool White Phoenix now has a web version

Free ransomware recovery tool White Phoenix now has a web version 2024-01-31 at 10:17 By Help Net Security White Phoenix is a free ransomware recovery tool for situations where files are encrypted with intermittent encryption. It was tested on BlackCat/ALPHV Ransomware, Play Ransomware, Qilin/Agenda Ransomware, BianLian Ransomware, and DarkBit. Intermittent encryption occurs when ransomware chooses

React to this headline:

Loading spinner

Free ransomware recovery tool White Phoenix now has a web version Read More »

Elusive Chinese Cyberspy Group Hijacks Software Updates to Deliver Malware

Elusive Chinese Cyberspy Group Hijacks Software Updates to Deliver Malware 2024-01-26 at 14:02 By Ionut Arghire The China-linked cyberespionage group Blackwood has been caught delivering malware to entities in China and Japan.  The post Elusive Chinese Cyberspy Group Hijacks Software Updates to Deliver Malware appeared first on SecurityWeek. This article is an excerpt from SecurityWeek

React to this headline:

Loading spinner

Elusive Chinese Cyberspy Group Hijacks Software Updates to Deliver Malware Read More »

Uncovering Atomic Stealer (AMOS) Strikes and the Rise of Dead Cookies Restoration

Uncovering Atomic Stealer (AMOS) Strikes and the Rise of Dead Cookies Restoration 2024-01-25 at 15:01 By neetha871ad236bd CRIL analyzes an ongoing phishing campaign spreading an updated version of Atomic Stealer targeting Mac users. The post Uncovering Atomic Stealer (AMOS) Strikes and the Rise of Dead Cookies Restoration appeared first on Cyble. The post Uncovering Atomic

React to this headline:

Loading spinner

Uncovering Atomic Stealer (AMOS) Strikes and the Rise of Dead Cookies Restoration Read More »

Blackwood APT delivers malware by hijacking legitimate software update requests

Blackwood APT delivers malware by hijacking legitimate software update requests 2024-01-25 at 13:32 By Help Net Security ESET researchers have discovered NSPX30, a sophisticated implant used by a new China-aligned APT group, which they dubbed Blackwood. Blackwood has carried out cyberespionage operations against individuals and companies from China, Japan, and the United Kingdom. It leverages

React to this headline:

Loading spinner

Blackwood APT delivers malware by hijacking legitimate software update requests Read More »

Protected: Uncovering Atomic Stealer (AMOS) Strikes and the Cookie Resurgence Trend 

Protected: Uncovering Atomic Stealer (AMOS) Strikes and the Cookie Resurgence Trend  2024-01-25 at 13:16 By neetha871ad236bd There is no excerpt because this is a protected post. The post Protected: Uncovering Atomic Stealer (AMOS) Strikes and the Cookie Resurgence Trend  appeared first on Cyble. The post Protected: Uncovering Atomic Stealer (AMOS) Strikes and the Cookie Resurgence

React to this headline:

Loading spinner

Protected: Uncovering Atomic Stealer (AMOS) Strikes and the Cookie Resurgence Trend  Read More »

AI expected to increase volume, impact of cyberattacks

AI expected to increase volume, impact of cyberattacks 2024-01-25 at 12:16 By Helga Labus All types of cyber threat actor are already using artificial intelligence (AI) to varying degrees, UK National Cyber Security Centre’s analysts say, and predict that AI “will almost certainly increase the volume and heighten the impact of cyberattacks over the next

React to this headline:

Loading spinner

AI expected to increase volume, impact of cyberattacks Read More »

Threat Actors Target US Asylum Seekers with MetaStealer Malware

Threat Actors Target US Asylum Seekers with MetaStealer Malware 2024-01-22 at 16:17 By cybleinc Threat Actors Target US Asylum Seekers with MetaStealer Malware Key Takeaways Cyble Research and Intelligence Labs (CRIL) came across a ZIP archive file that could be downloaded from a URL and possibly disseminated through spam emails. Within the ZIP file lies

React to this headline:

Loading spinner

Threat Actors Target US Asylum Seekers with MetaStealer Malware Read More »

Cyble Global Sensors pick up persistent exploitation of Ivanti Connect Secure Vulnerabilities

Cyble Global Sensors pick up persistent exploitation of Ivanti Connect Secure Vulnerabilities 2024-01-19 at 16:18 By cybleinc Cyble Global Sensors pick up persistent exploitation of Ivanti Connect Secure Vulnerabilities Introduction Cyble Global Sensor Intelligence (CGSI) has detected the continuous exploitation of recently revealed vulnerabilities in Ivanti Connect Secure (ICS), previously known as Pulse Connect Secure

React to this headline:

Loading spinner

Cyble Global Sensors pick up persistent exploitation of Ivanti Connect Secure Vulnerabilities Read More »

Scroll to Top