Malware

Cyber Espionage Attack on the Indian Air Force: Go-Based Infostealer Exploits Slack for Data Theft

Cyber Espionage Attack on the Indian Air Force: Go-Based Infostealer Exploits Slack for Data Theft 2024-01-17 at 12:01 By cybleinc Cyber Espionage Attack on the Indian Air Force: Go-Based Infostealer Exploits Slack for Data Theft Key Takeaways Cyble Research and Intelligence Labs (CRIL) identified a Go Stealer variant potentially targeting the Indian Air Force. The […]

React to this headline:

Loading spinner

Cyber Espionage Attack on the Indian Air Force: Go-Based Infostealer Exploits Slack for Data Theft Read More »

Windows SmartScreen bug exploited to deliver powerful info-stealer (CVE-2023-36025)

Windows SmartScreen bug exploited to deliver powerful info-stealer (CVE-2023-36025) 2024-01-15 at 15:31 By Zeljka Zorz A vulnerability (CVE-2023-36025) that Microsoft fixed in November 2023 continues to be exploited by malware peddlers: this time around, the delivered threat is a variant of the Phemedrone Stealer. About the malware Phemedrone Stealer is a piece of malware written

React to this headline:

Loading spinner

Windows SmartScreen bug exploited to deliver powerful info-stealer (CVE-2023-36025) Read More »

Information Stealer Exploits Windows SmartScreen Bypass

Information Stealer Exploits Windows SmartScreen Bypass 2024-01-15 at 14:46 By Ionut Arghire Attackers exploit a recent Windows SmartScreen bypass vulnerability to deploy the Phemedrone information stealer. The post Information Stealer Exploits Windows SmartScreen Bypass appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS Feed View Original Source React to this headline:

React to this headline:

Loading spinner

Information Stealer Exploits Windows SmartScreen Bypass Read More »

Sneaky Azorult Back in Action and Goes Undetected

Sneaky Azorult Back in Action and Goes Undetected 2024-01-12 at 17:31 By dakshsharma16 Key Takeaways Overview First identified in 2016, Azorult malware operates as an information-stealing threat, collecting data such as browsing history, cookies, login credentials, and cryptocurrency details. Additionally, it can function as a downloader for other malware families. This malicious software was offered

React to this headline:

Loading spinner

Sneaky Azorult Back in Action and Goes Undetected Read More »

Festive Facade: Dissecting Multi-Stage Malware in New Year-themed Lure

Festive Facade: Dissecting Multi-Stage Malware in New Year-themed Lure 2024-01-05 at 11:26 By cybleinc CRIL analyzes New Year-themed malware utilizing JS Downloader and DLL Sideloading to infect potential victims. The post Festive Facade: Dissecting Multi-Stage Malware in New Year-themed Lure appeared first on Cyble. This article is an excerpt from Cyble View Original Source React

React to this headline:

Loading spinner

Festive Facade: Dissecting Multi-Stage Malware in New Year-themed Lure Read More »

Several Infostealers Using Persistent Cookies to Hijack Google Accounts

Several Infostealers Using Persistent Cookies to Hijack Google Accounts 2024-01-03 at 17:46 By Ionut Arghire A vulnerability in Google’s authentication process allows malware to restore cookies and hijack user sessions. The post Several Infostealers Using Persistent Cookies to Hijack Google Accounts appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS Feed View

React to this headline:

Loading spinner

Several Infostealers Using Persistent Cookies to Hijack Google Accounts Read More »

21 New Mac Malware Families Emerged in 2023

21 New Mac Malware Families Emerged in 2023 2024-01-03 at 14:46 By Eduard Kovacs A total of 21 new malware families targeting macOS systems were discovered in 2023, a 50% increase compared to 2022.  The post 21 New Mac Malware Families Emerged in 2023 appeared first on SecurityWeek. This article is an excerpt from SecurityWeek

React to this headline:

Loading spinner

21 New Mac Malware Families Emerged in 2023 Read More »

29 malware families target 1,800 banking apps worldwide

29 malware families target 1,800 banking apps worldwide 2024-01-03 at 06:31 By Help Net Security Mobile banking is outpacing online banking across all age groups due to its convenience and our desire to have those apps at our fingertips, according to Zimperium. However, this surge is accompanied by a dramatic growth in financial fraud. The

React to this headline:

Loading spinner

29 malware families target 1,800 banking apps worldwide Read More »

Decoding qBit Stealer’s Source Release and Data Exfiltration Prowess

Decoding qBit Stealer’s Source Release and Data Exfiltration Prowess 2023-12-28 at 12:47 By cybleinc CRIL investigates the source code of qBit – which has recently appeared on a cybercrime forum – delving into its exfiltration capabilities. The post Decoding qBit Stealer’s Source Release and Data Exfiltration Prowess appeared first on Cyble. This article is an

React to this headline:

Loading spinner

Decoding qBit Stealer’s Source Release and Data Exfiltration Prowess Read More »

A closer look at the manufacturing threat landscape

A closer look at the manufacturing threat landscape 21/12/2023 at 08:49 By Help Net Security The manufacturing industry is embracing digital transformation to fuel efficiency and productivity. However, this evolution is accompanied by profound and growing cybersecurity challenges. In this Help Net Security video, Kory Daniels, CISO at Trustwave, discusses recent comprehensive research highlighting the

React to this headline:

Loading spinner

A closer look at the manufacturing threat landscape Read More »

86% of cyberattacks are delivered over encrypted channels

86% of cyberattacks are delivered over encrypted channels 21/12/2023 at 07:00 By Help Net Security Threats over HTTPS grew by 24% from 2022, underscoring the sophisticated nature of cybercriminal tactics that target encrypted channels, according to Zscaler. For the second year in a row, manufacturing was the industry most commonly targeted, with education and government

React to this headline:

Loading spinner

86% of cyberattacks are delivered over encrypted channels Read More »

8220 gang exploits old Oracle WebLogic vulnerability to deliver infostealers, cryptominers

8220 gang exploits old Oracle WebLogic vulnerability to deliver infostealers, cryptominers 20/12/2023 at 16:02 By Helga Labus The 8220 gang has been leveraging an old Oracle WebLogic Server vulnerability (CVE-2020-14883) to distribute malware, the Imperva Threat Research team has found. About 8220 Active since 2017, the 8220 gang has been known for deploying cryptocurrency miners

React to this headline:

Loading spinner

8220 gang exploits old Oracle WebLogic vulnerability to deliver infostealers, cryptominers Read More »

Qakbot returns in fresh assault on hospitality sector

Qakbot returns in fresh assault on hospitality sector 18/12/2023 at 15:47 By Helga Labus The Qakbot botnet has been disrupted this summer, but cybercriminals are not ready to give up on the malware: Microsoft’s threat analysts have spotted a new phishing campaign attempting to deliver it to targets in the hospitality industry. Qakbot and its

React to this headline:

Loading spinner

Qakbot returns in fresh assault on hospitality sector Read More »

Lazarus exploit Log4Shell vulnerability to deliver novel RAT malware

Lazarus exploit Log4Shell vulnerability to deliver novel RAT malware 12/12/2023 at 17:50 By Helga Labus North Korea-backed group Lazarus has been spotted exploiting the Log4Shell vulnerability (CVE-2021-44228) and novel malware written in DLang (i.e., the memory-safe D programming language). “This campaign consists of continued opportunistic targeting of enterprises globally that publicly host and expose their

React to this headline:

Loading spinner

Lazarus exploit Log4Shell vulnerability to deliver novel RAT malware Read More »

Recruiters, beware of cybercrooks posing as job applicants!

Recruiters, beware of cybercrooks posing as job applicants! 12/12/2023 at 16:46 By Zeljka Zorz Recruiters are being targeted via spear-phishing emails sent by cybercrooks impersonating job applicants, Proofpoint researchers are warning. “The tone and content of the emails suggest to the recipient the actor is a legitimate candidate, and because the actor specifically targets people

React to this headline:

Loading spinner

Recruiters, beware of cybercrooks posing as job applicants! Read More »

North Korean Hackers Developing Malware in Dlang Programming Language

North Korean Hackers Developing Malware in Dlang Programming Language 11/12/2023 at 18:16 By Ionut Arghire North Korean hackers have used Dlang-based malware in attacks against manufacturing, agriculture, and physical security organizations. The post North Korean Hackers Developing Malware in Dlang Programming Language appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS Feed

React to this headline:

Loading spinner

North Korean Hackers Developing Malware in Dlang Programming Language Read More »

Cybercriminals continue targeting open remote access products

Cybercriminals continue targeting open remote access products 11/12/2023 at 08:05 By Help Net Security Cybercriminals still prefer targeting open remote access products, or like to leverage legitimate remote access tools to hide their malicious actions, according to WatchGuard. “Threat actors continue using different tools and methods in their attack campaigns, making it critical for organizations

React to this headline:

Loading spinner

Cybercriminals continue targeting open remote access products Read More »

SMBs face surge in “malware free” attacks

SMBs face surge in “malware free” attacks 28/11/2023 at 12:51 By Helga Labus “Malware free” attacks, attackers’ increased reliance on legitimate tools and scripting frameworks, and BEC scams were the most prominent threats small and medium businesses (SMBs) faced in Q3 2023, says the inaugural SMB Threat Report by Huntress, a company that provides a

React to this headline:

Loading spinner

SMBs face surge in “malware free” attacks Read More »

New Persian Remote World Selling  a Suite of Malicious Tools

New Persian Remote World Selling  a Suite of Malicious Tools 23/11/2023 at 11:46 By cybleinc CRIL analyzes a new website – Persian Remote World – selling malicious software, including RATs and Malware loaders, for monetary gain. The post New Persian Remote World Selling  a Suite of Malicious Tools appeared first on Cyble. This article is

React to this headline:

Loading spinner

New Persian Remote World Selling  a Suite of Malicious Tools Read More »

Scroll to Top