Malware

DreamBus Botnet Exploiting RocketMQ Vulnerability to Delivery Cryptocurrency Miner

DreamBus Botnet Exploiting RocketMQ Vulnerability to Delivery Cryptocurrency Miner 30/08/2023 at 14:17 By Eduard Kovacs The DreamBus botnet has resurfaced and it has been exploiting a recently patched Apache RocketMQ vulnerability to deliver a Monero miner. The post DreamBus Botnet Exploiting RocketMQ Vulnerability to Delivery Cryptocurrency Miner appeared first on SecurityWeek. This article is an […]

React to this headline:

Loading spinner

DreamBus Botnet Exploiting RocketMQ Vulnerability to Delivery Cryptocurrency Miner Read More »

Qakbot botnet disrupted, malware removed from 700,000+ victim computers

Qakbot botnet disrupted, malware removed from 700,000+ victim computers 29/08/2023 at 21:19 By Zeljka Zorz The Qakbot botnet has been crippled by the US Department of Justice (DOJ): 52 of its servers have been seized and the popular malware loader has been removed from over 700,000 victim computers around the world. “To disrupt the botnet,

React to this headline:

Loading spinner

Qakbot botnet disrupted, malware removed from 700,000+ victim computers Read More »

Lazarus Group exploited ManageEngine vulnerability to target critical infrastructure

Lazarus Group exploited ManageEngine vulnerability to target critical infrastructure 25/08/2023 at 15:36 By Helga Labus North Korean state-sponsored hackers Lazarus Group have been exploiting a ManageEngine ServiceDesk vulnerability (CVE-2022-47966) to target internet backbone infrastructure and healthcare institutions in Europe and the US. The group leveraged the vulnerability to deploy QuiteRAT, downloaded from an IP address

React to this headline:

Loading spinner

Lazarus Group exploited ManageEngine vulnerability to target critical infrastructure Read More »

WinRAR patches zero-day bug that targeted stock and crypto traders

WinRAR patches zero-day bug that targeted stock and crypto traders 25/08/2023 at 08:04 By Cointelegraph By Martin Young According to cybersecurity firm Group-IB, weaponized ZIP file archives were being shared on crypto trading forums, with each one containing a nasty surprise. This article is an excerpt from Cointelegraph.com News View Original Source React to this

React to this headline:

Loading spinner

WinRAR patches zero-day bug that targeted stock and crypto traders Read More »

Ransomware dwell time hits new low

Ransomware dwell time hits new low 25/08/2023 at 06:34 By Help Net Security Median attacker dwell time—the time from when an attack starts to when it’s detected—shrunk from 10 to eight days for all attacks, and to five days for ransomware attacks during the first half of 2023, according to Sophos. In 2022, the median

React to this headline:

Loading spinner

Ransomware dwell time hits new low Read More »

Mysterious Malware Uses Wi-Fi Scanning to Get Location of Infected Device

Mysterious Malware Uses Wi-Fi Scanning to Get Location of Infected Device 24/08/2023 at 18:31 By Eduard Kovacs Mysterious Whiffy Recon malware scans for nearby Wi-Fi access points to obtain the location of the infected device. The post Mysterious Malware Uses Wi-Fi Scanning to Get Location of Infected Device appeared first on SecurityWeek. This article is

React to this headline:

Loading spinner

Mysterious Malware Uses Wi-Fi Scanning to Get Location of Infected Device Read More »

Bogus OfficeNote app delivers XLoader macOS malware

Bogus OfficeNote app delivers XLoader macOS malware 23/08/2023 at 14:33 By Helga Labus A new macOS-specific variant of the well known XLoader malware is being delivered disguised as the “OfficeNote” app. “Multiple submissions of this sample have appeared on VirusTotal throughout July, indicating that the malware has been widely distributed in the wild,” SentinelOne researchers

React to this headline:

Loading spinner

Bogus OfficeNote app delivers XLoader macOS malware Read More »

Researchers Uncover Real Identity of CypherRAT and CraxsRAT Malware Developer

Researchers Uncover Real Identity of CypherRAT and CraxsRAT Malware Developer 21/08/2023 at 17:18 By Ionut Arghire Cyfirma security researchers uncover the real identity of the CypherRAT and CraxsRAT malware developer and MaaS operator. The post Researchers Uncover Real Identity of CypherRAT and CraxsRAT Malware Developer appeared first on SecurityWeek. This article is an excerpt from

React to this headline:

Loading spinner

Researchers Uncover Real Identity of CypherRAT and CraxsRAT Malware Developer Read More »

Thousands of Systems Turned Into Proxy Exit Nodes via Malware

Thousands of Systems Turned Into Proxy Exit Nodes via Malware 17/08/2023 at 16:18 By Ionut Arghire Threat actors have been observed deploying a proxy application on Windows and macOS systems that were infected with malware. The post Thousands of Systems Turned Into Proxy Exit Nodes via Malware appeared first on SecurityWeek. This article is an

React to this headline:

Loading spinner

Thousands of Systems Turned Into Proxy Exit Nodes via Malware Read More »

Macs are getting compromised to act as proxy exit nodes

Macs are getting compromised to act as proxy exit nodes 14/08/2023 at 14:01 By Zeljka Zorz AdLoad, well-known malware that has been targeting systems running macOS for over half a decade, has been observed delivering a new payload that – unbeknown to the owners – enlisted their systems into a residential proxy botnet. According to

React to this headline:

Loading spinner

Macs are getting compromised to act as proxy exit nodes Read More »

APTs use of lesser-known TTPs are no less of a headache

APTs use of lesser-known TTPs are no less of a headache 14/08/2023 at 08:32 By Help Net Security APT (advanced persistent threat) attacks were once considered to be primarily a problem for large corporations, but the number of these (often state-sponsored) attacks against small- and medium-sized businesses has increased significantly. Everyone is fair game, and

React to this headline:

Loading spinner

APTs use of lesser-known TTPs are no less of a headache Read More »

Threat intelligence’s key role in mitigating malware threats

Threat intelligence’s key role in mitigating malware threats 11/08/2023 at 07:02 By Help Net Security Malware, being one of the most prevalent and pervasive initial threat vectors, continues to adapt and become more sophisticated, according to OPSWAT. Crucial role of threat intelligence Threat actors leverage malware as an initial foothold to infiltrate targeted infrastructures and

React to this headline:

Loading spinner

Threat intelligence’s key role in mitigating malware threats Read More »

AgentTesla Malware Targets Users with Malicious Control Panel File

AgentTesla Malware Targets Users with Malicious Control Panel File 09/08/2023 at 22:02 By cybleinc Cyble Research and Intelligence Labs analyzes the distribution method of AgentTesla malware using malicious control panel files. The post AgentTesla Malware Targets Users with Malicious Control Panel File appeared first on Cyble. This article is an excerpt from Cyble View Original

React to this headline:

Loading spinner

AgentTesla Malware Targets Users with Malicious Control Panel File Read More »

The ransomware rollercoaster continues as criminals advance their business models

The ransomware rollercoaster continues as criminals advance their business models 09/08/2023 at 06:02 By Help Net Security Ransomware shows no signs of slowing, with ransomware activity ending 13 times higher than at the start of 2023 as a proportion of all malware detections, according to Fortinet. Ransomware detections 1H 2023 FortiGuard Labs has documented substantial

React to this headline:

Loading spinner

The ransomware rollercoaster continues as criminals advance their business models Read More »

Navigating the gray zone of ransomware payment practices

Navigating the gray zone of ransomware payment practices 07/08/2023 at 06:33 By Help Net Security Ransomware remains a lucrative tool for cybercriminals as attackers continue to target a wide array of businesses. In response to this growing threat, an increasing number of organizations are compelled to meet ransom demands, perceiving it as their only viable

React to this headline:

Loading spinner

Navigating the gray zone of ransomware payment practices Read More »

CISA Analyzes Malware Used in Barracuda ESG Attacks

CISA Analyzes Malware Used in Barracuda ESG Attacks 31/07/2023 at 13:31 By Ionut Arghire CISA has shared analysis reports on three malware families obtained from an organization hacked via a recent Barracuda ESG vulnerability. The post CISA Analyzes Malware Used in Barracuda ESG Attacks appeared first on SecurityWeek. This article is an excerpt from SecurityWeek

React to this headline:

Loading spinner

CISA Analyzes Malware Used in Barracuda ESG Attacks Read More »

Sneaky XWorm Uses MultiStaged Attack

Sneaky XWorm Uses MultiStaged Attack 28/07/2023 at 19:02 By cybleinc Cyble Research and Intelligence Labs examines XWorm malware’s latest multi-staged attack. The post Sneaky XWorm Uses MultiStaged Attack appeared first on Cyble. This article is an excerpt from Cyble View Original Source React to this headline:

React to this headline:

Loading spinner

Sneaky XWorm Uses MultiStaged Attack Read More »

Cryptojacking soars as cyberattacks increase, diversify

Cryptojacking soars as cyberattacks increase, diversify 27/07/2023 at 05:03 By Help Net Security Digital threat actors are adopting evolving tactical behaviors, opting for different types of malicious attacks compared to previous years, according to SonicWall. Overall intrusion attempts were up, led by the highest year on record for global cryptojacking volume recorded by SonicWall, as

React to this headline:

Loading spinner

Cryptojacking soars as cyberattacks increase, diversify Read More »

Threat Actor Targeting Developers via Trojanized MS Visual Studio

Threat Actor Targeting Developers via Trojanized MS Visual Studio 25/07/2023 at 18:06 By cybleinc CRIL examines a Trojanized Visual Studio installer that deploys a Cookie Stealer and utilizes Telegram for data exfiltration. The post Threat Actor Targeting Developers via Trojanized MS Visual Studio appeared first on Cyble. This article is an excerpt from Cyble View

React to this headline:

Loading spinner

Threat Actor Targeting Developers via Trojanized MS Visual Studio Read More »

RaaS proliferation: 14 new ransomware groups target organizations worldwide

RaaS proliferation: 14 new ransomware groups target organizations worldwide 25/07/2023 at 06:00 By Help Net Security In the Q2 2023, GuidePoint Research and Intelligence Team (GRIT) tracked 1,177 total publicly posted ransomware victims claimed by 41 different threat groups. The most impacted industries GRIT’s report shows a 38% increase in public ransomware victims compared to

React to this headline:

Loading spinner

RaaS proliferation: 14 new ransomware groups target organizations worldwide Read More »

Scroll to Top