Malware

Vietnamese Threat Actor’s Multi-Layered Strategy on Digital Marketing Professionals

Vietnamese Threat Actor’s Multi-Layered Strategy on Digital Marketing Professionals 2024-10-18 at 12:48 By rohansinhacyblecom Key takeaways Overview Cyble Research and Intelligence Lab (CRIL) has uncovered an advanced attack campaign that likely originates from spam emails containing phishing attachments. These emails include an archive file with an LNK file disguised as a PDF file. The attack […]

React to this headline:

Loading spinner

Vietnamese Threat Actor’s Multi-Layered Strategy on Digital Marketing Professionals Read More »

Fake Google Meet pages deliver infostealers

Fake Google Meet pages deliver infostealers 2024-10-17 at 14:47 By Zeljka Zorz Users of the Google Meet video communication service have been targeted by cyber crooks using the ClickFix tactic to infect them with information-stealing malware. Fake Google Meet video conference page with malicious ClickFix pop-up (Source: Sekoia) “The ClickFix tactic deceives users into downloading

React to this headline:

Loading spinner

Fake Google Meet pages deliver infostealers Read More »

MisterioLNK: The Open-Source Builder Behind Malicious Loaders

MisterioLNK: The Open-Source Builder Behind Malicious Loaders 2024-10-08 at 15:31 By rohansinhacyblecom Cyble Research and Intelligence Labs (CRIL) has uncovered a new, previously undetected loader builder known as “MisterioLNK.” This discovery follows our earlier analysis of Quantum Software, another LNK file-based builder that has been gaining traction in the cyber landscape. MisterioLNK, available on GitHub,

React to this headline:

Loading spinner

MisterioLNK: The Open-Source Builder Behind Malicious Loaders Read More »

Cyble Honeypot Sensors Detect D-Link, Cisco, QNAP and Linux Attacks

Cyble Honeypot Sensors Detect D-Link, Cisco, QNAP and Linux Attacks 2024-10-08 at 13:49 By dakshsharma16 Key Takeaways Overview Cyble’s Vulnerability Intelligence unit last week detected numerous exploit attempts, malware intrusions, phishing campaigns, and brute-force attacks via its network of Honeypot sensors. In the week of Sept. 25-Oct. 1, Cyble researchers identified several recent active exploits, including new attacks against a number of

React to this headline:

Loading spinner

Cyble Honeypot Sensors Detect D-Link, Cisco, QNAP and Linux Attacks Read More »

Linux systems targeted with stealthy “Perfctl” cryptomining malware

Linux systems targeted with stealthy “Perfctl” cryptomining malware 2024-10-07 at 15:46 By Zeljka Zorz Thousands of Linux systems are likely infected with the highly elusive and persistent “perfctl” (or “perfcc“) cryptomining malware and many others still could be at risk of getting compromised, Aqua Security researchers revealed last week. “In all the attacks observed, the

React to this headline:

Loading spinner

Linux systems targeted with stealthy “Perfctl” cryptomining malware Read More »

US Transportation and Logistics Firms Targeted With Infostealers, Backdoors

US Transportation and Logistics Firms Targeted With Infostealers, Backdoors 2024-09-26 at 15:01 By Ionut Arghire A malicious campaign is targeting transportation and logistics organizations in North America with various malware families. The post US Transportation and Logistics Firms Targeted With Infostealers, Backdoors appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS Feed

React to this headline:

Loading spinner

US Transportation and Logistics Firms Targeted With Infostealers, Backdoors Read More »

AI-Generated Malware Found in the Wild

AI-Generated Malware Found in the Wild 2024-09-24 at 20:16 By Kevin Townsend HP has intercepted an email campaign comprising a standard malware payload delivered by an AI-generated dropper. The post AI-Generated Malware Found in the Wild appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS Feed View Original Source React to this

React to this headline:

Loading spinner

AI-Generated Malware Found in the Wild Read More »

Transportation, logistics companies targeted with lures impersonating fleet management software

Transportation, logistics companies targeted with lures impersonating fleet management software 2024-09-24 at 17:46 By Zeljka Zorz Financially motivated threat actors are targeting North American companies in the transportation and logistics sector with tailored lures, info-stealing malware, and a clever new trick. How the attack unfolds According to Proofpoint threat researchers, the attackers start by compromising

React to this headline:

Loading spinner

Transportation, logistics companies targeted with lures impersonating fleet management software Read More »

Cyble Sensor Intelligence: Attacks, Phishing Scams and Brute-Force Detections

Cyble Sensor Intelligence: Attacks, Phishing Scams and Brute-Force Detections 2024-09-20 at 17:31 By dakshsharma16 Key Takeaways Overview The Cyble Global Sensor Intelligence Network, or CGSI, monitors and captures real-time attack data through Cyble’s network of Honeypot sensors. This week, Cyble’s Threat Hunting service discovered and investigated dozens of exploit attempts, malware intrusions, financial fraud, and brute-force attacks. 

React to this headline:

Loading spinner

Cyble Sensor Intelligence: Attacks, Phishing Scams and Brute-Force Detections Read More »

Windows users targeted with fake human verification pages delivering malware

Windows users targeted with fake human verification pages delivering malware 2024-09-19 at 17:01 By Zeljka Zorz For a while now, security researchers have been warning about fake human verification pages tricking Windows users into inadvertently installing malware. A recently exposed campaign showed how some users end up on these pages. Beware of fake human verification

React to this headline:

Loading spinner

Windows users targeted with fake human verification pages delivering malware Read More »

Top Cyber Threats of the Week: Brute Force Attacks, CVE Attempts and Malware Infections

Top Cyber Threats of the Week: Brute Force Attacks, CVE Attempts and Malware Infections 2024-09-16 at 16:04 By Cyble Overview  The Cyble Global Sensor Intelligence Network, or CGSI, has been actively monitoring and capturing real-time attack data through various Honeypot sensors. Last week’s research reveals the top cyber threats of the week including multiple exploit

React to this headline:

Loading spinner

Top Cyber Threats of the Week: Brute Force Attacks, CVE Attempts and Malware Infections Read More »

New ‘Hadooken’ Linux Malware Targets WebLogic Servers

New ‘Hadooken’ Linux Malware Targets WebLogic Servers 2024-09-13 at 15:01 By Ionut Arghire The recently observed Hadooken malware targeting Oracle WebLogic applications is linked to multiple ransomware families. The post New ‘Hadooken’ Linux Malware Targets WebLogic Servers appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS Feed View Original Source React to

React to this headline:

Loading spinner

New ‘Hadooken’ Linux Malware Targets WebLogic Servers Read More »

1.3 Million Android TV Boxes Infected by Vo1d Malware

1.3 Million Android TV Boxes Infected by Vo1d Malware 2024-09-13 at 13:17 By Ionut Arghire Doctor Web warns of the new Vo1d Android malware infecting roughly 1.3 million TV boxes running older OS versions. The post 1.3 Million Android TV Boxes Infected by Vo1d Malware appeared first on SecurityWeek. This article is an excerpt from

React to this headline:

Loading spinner

1.3 Million Android TV Boxes Infected by Vo1d Malware Read More »

Iranian Hackers Targeting Iraqi Government: Security Firm

Iranian Hackers Targeting Iraqi Government: Security Firm 2024-09-12 at 13:46 By Eduard Kovacs Hackers believed to be operating on behalf of the Iranian government have deployed malware to Iraqi government networks.  The post Iranian Hackers Targeting Iraqi Government: Security Firm appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS Feed View Original

React to this headline:

Loading spinner

Iranian Hackers Targeting Iraqi Government: Security Firm Read More »

Reputation Hijacking with JamPlus: A Maneuver to Bypass Smart App Control (SAC)

Reputation Hijacking with JamPlus: A Maneuver to Bypass Smart App Control (SAC) 2024-09-09 at 16:02 By rohansinhacyblecom Key takeaways Overview CapCut, a video editing tool developed by Bytedance, has become increasingly popular. This popularity has extended to CapCut-themed attacks, which are on the rise among TAs. These themes have been frequently used in phishing campaigns.

React to this headline:

Loading spinner

Reputation Hijacking with JamPlus: A Maneuver to Bypass Smart App Control (SAC) Read More »

ManticoraLoader: New Loader Announced from the Developers of AresLoader

ManticoraLoader: New Loader Announced from the Developers of AresLoader 2024-08-30 at 15:01 By rohansinhacyblecom Cyble Research & Intelligence Labs (CRIL) has discovered the announcement of a new malware-as-a-service named ‘ManticoraLoader’ in the underground. The threat actors behind the group DeadXInject have been offering the service in underground forums and on their Telegram channel since August

React to this headline:

Loading spinner

ManticoraLoader: New Loader Announced from the Developers of AresLoader Read More »

Midnight Blizzard delivered iOS, Chrome exploits via compromised government websites

Midnight Blizzard delivered iOS, Chrome exploits via compromised government websites 2024-08-29 at 16:16 By Zeljka Zorz Suspected Russian hackers have been hitting iPhone and Android users visiting government websites with exploits first leveraged by commercial surveillance vendors, Google TAG researchers shared. The watering hole campaigns Between November 2023 and July 2024, threat actors have repeatedly

React to this headline:

Loading spinner

Midnight Blizzard delivered iOS, Chrome exploits via compromised government websites Read More »

Iranian Hackers Use New Tickler Malware to Collect Intel From US, UAE

Iranian Hackers Use New Tickler Malware to Collect Intel From US, UAE 2024-08-29 at 13:01 By Eduard Kovacs The Iran-linked state-sponsored hacker group tracked as Peach Sandstorm has started using a new backdoor in attacks aimed at the US and UAE. The post Iranian Hackers Use New Tickler Malware to Collect Intel From US, UAE

React to this headline:

Loading spinner

Iranian Hackers Use New Tickler Malware to Collect Intel From US, UAE Read More »

Malware Delivered via Malicious Pidgin Plugin, Signal Fork

Malware Delivered via Malicious Pidgin Plugin, Signal Fork 2024-08-28 at 16:01 By Eduard Kovacs Threat actors delivered malware via instant messaging applications, including a malicious Pidgin plugin and an unofficial Signal fork. The post Malware Delivered via Malicious Pidgin Plugin, Signal Fork appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS Feed

React to this headline:

Loading spinner

Malware Delivered via Malicious Pidgin Plugin, Signal Fork Read More »

US Offering $2.5 Million Reward for Belarusian Malware Distributor

US Offering $2.5 Million Reward for Belarusian Malware Distributor 2024-08-28 at 14:01 By Ionut Arghire The US government is offering a $2.5 million reward for information leading to the arrest of malware distributor Volodymyr Kadariya. The post US Offering $2.5 Million Reward for Belarusian Malware Distributor appeared first on SecurityWeek. This article is an excerpt

React to this headline:

Loading spinner

US Offering $2.5 Million Reward for Belarusian Malware Distributor Read More »

Scroll to Top