March 10, 2023
Via: The Hacker NewsGoogle-owned Mandiant said the threat cluster shares “multiple overlaps” with a long-running operation dubbed “Dream Job” that employs job recruitment lures in email messages to trigger the infection sequence. UNC2970 is the new moniker designated by the threat intelligence firm […]
March 9, 2023
Via: Security AffairsFortinet researchers observed the mining group 8220 Gang using a new crypter called ScrubCrypt in cryptojacking attacks. “Between January and February 2023, FortiGuard Labs observed a payload targeting an exploitable Oracle Weblogic Server in a specific URI.” reads the analysis […]
March 8, 2023
Via: The Hacker NewsThe North Korea-linked Lazarus Group has been observed weaponizing flaws in an undisclosed software to breach a financial business entity in South Korea twice within a span of a year. While the first attack in May 2022 entailed the use […]
March 6, 2023
Via: Help Net SecurityIn a joint effort, the German Regional Police, Ukrainian National Police, Europol, Dutch Police, and FBI joined forces on February 28, 2023, to take down the masterminds behind a notorious criminal organization responsible for unleashing devastating cyberattacks using the DoppelPaymer […]
February 27, 2023
Via: The Hacker NewsThe Dutch police announced the arrest of three individuals in connection with a “large-scale” criminal operation involving data theft, extortion, and money laundering. The suspects include two 21-year-old men from Zandvoort and Rotterdam and an 18-year-old man without a permanent […]
February 24, 2023
Via: Help Net SecurityThe war in Ukraine has seen the emergence of new forms of cyberattacks, and hacktivists became savvier and more emboldened to deface sites, leak information and execute DDoS attacks, according to Trellix. “Q4 saw malicious actors push the limits of […]
February 23, 2023
Via: The Hacker NewsMaterials research organizations in Asia have been targeted by a previously unknown threat actor using a distinct set of tools. Symantec, by Broadcom Software, is tracking the cluster under the moniker Clasiopa. The origins of the hacking group and its […]
February 15, 2023
Via: DataBreach TodayA U.S. jury returned a guilty verdict against a man who ran a criminal hacking scheme that earned $90 million via insider trading while running a Moscow-based IT services firm associated with the Russian government. After a 10-day trial, a […]
February 14, 2023
Via: Dark ReadingNine suspects have been arrested — eight in Madrid and one in Miami — for their suspected participation in a cybercriminal organization accused of stealing more than 5 million euros from unsuspecting victims in less than a year. The joint […]
February 13, 2023
Via: Help Net SecurityCybercriminals remained active in spying and information stealing, with lottery-themed adware campaigns used as a tactic to obtain people’s contact details, according to Avast. Threats using social engineering to steal money, such as refund and invoice fraud and tech support […]
February 8, 2023
Via: The Hacker NewsA Russian national on February 7, 2023, pleaded guilty in the U.S. to money laundering charges and for attempting to conceal the source of funds obtained in connection with Ryuk ransomware attacks. Denis Mihaqlovic Dubnikov, 30, was arrested in Amsterdam […]
February 7, 2023
Via: The Hacker NewsThreat actors are leveraging known flaws in Sunlogin software to deploy the Sliver command-and-control (C2) framework for carrying out post-exploitation activities. The findings come from AhnLab Security Emergency response Center (ASEC), which found that security vulnerabilities in Sunlogin, a remote […]
February 2, 2023
Via: DataBreach TodayA threat intelligence firm spotted North Korean hackers engaged in technological espionage in a campaign that betrayed recurring elements of the Pyongyang hacking toolkit. Cybersecurity firm WithSecure says it detected a campaign targeting the medical research and energy sectors that […]
February 2, 2023
Via: Dark ReadingSecurity researchers on Feb. 2 reported that they have detected a cyberattack campaign by the North Korean Lazarus Group, targeting medical research and energy organizations for espionage purposes. The attribution was made by threat intelligence analysts for WithSecure, which discovered […]
January 31, 2023
Via: CSO OnlineResearchers from cybersecurity firm Proofpoint claim to have discovered a new threat campaign involving malicious third-party OAuth apps that are used to infiltrate organizations’ cloud environments. According to a blog on the company’s website, threat actors satisfied Microsoft’s requirements for […]
January 27, 2023
Via: CSO OnlineThe US Department of Justice (DOJ) along with international partners have taken down the Hive ransomware group. The operation that began in July 2022 resulted in the FBI penetrating Hive’s computer networks, capturing its decryption keys, and offering them to […]
Hacker, Threats & Malware, Vulnerabilities
January 13, 2023
Via: CSO OnlineThe Royal ransomware group is believed to be actively exploiting a critical security flaw affecting Citrix systems, according to the cyber research team at cyber insurance provider At-Bay. Announced by Citrix on November 8, 2022, the vulnerability, identified as CVE-2022-27510, […]
Hacker, Mobile, Mobile security, Threats & Malware
January 10, 2023
Via: The Hacker NewsThe advanced persistent threat (APT) group known as StrongPity has targeted Android users with a trojanized version of the Telegram app through a fake website that impersonates a video chat service called Shagle. “A copycat website, mimicking the Shagle service, […]
January 9, 2023
Via: TechRadarChatGPT continues filling the headlines – but this time for all the wrong reasons, experts have warned. Cybersecurity researchers from Check Point Research (CPR) have observed the tool being used by cybercriminals to improve – and sometimes build from scratch […]
January 6, 2023
Via: Security WeekActive since at least 2006 and linked to the Russian government, the cyberespionage group is also tracked as Snake, Venomous Bear, Krypton, and Waterbug, and has been historically associated with the use of the ComRAT malware. Also known as Wauchos […]