Category: Information Security

AcidRain

AcidPour: New Linux Wiper Threat Targets x86 Devices

Security researchers at SentinelLabs have uncovered a new variant of the wiper, AcidRain, meticulously engineered for assaults on Linux x86 devices. Dubbed AcidPour, this malicious entity manifests as a binary ELF file, tailored for...

AT&T data leak

70 Million AT&T Records Found on Hacker Forum

Over the past weekend, an immense database containing more than 70 million records, purportedly stolen from the American telecommunications behemoth AT&T in 2021, was discovered on a cybercriminal forum. According to Dark Web Informer,...

DEEP#GOSU campaign

DEEP#GOSU Exposed: New Cyber Espionage Campaign

The cybersecurity firm Securonix has uncovered a new campaign in which hackers employ sophisticated techniques to infiltrate Windows computers and exfiltrate confidential data. Named DEEP#GOSU, the campaign is believed to be linked to the...

ITG05 phishing campaigns

ITG05 Strikes: Global Phishing Campaign Exposed

IBM X-Force reports a series of phishing campaigns by ITG05, involving the distribution of counterfeit documents purporting to be from governmental and non-governmental organizations across Europe, the Caucasus, Central Asia, and both North and...

gitgub campaign

Gitgub Campaign: Info Stealer Targets GitHub Users

Security researchers have uncovered multiple repositories on GitHub distributing malicious software under the guise of cracked versions of popular software. In a malicious operation dubbed “gitgub,” specialists from the German company G DATA identified...

trojanized Notepad++

Chinese Users Targeted: Notepad++ Search Results Poisoned

In recent research, it was revealed that Chinese users seeking official versions of software like Notepad++ and VNote through search engines such as Baidu are increasingly falling victim to cunning cybercriminals. The attacks are...

StopCrypt ransomware

Ransomware Alert: StopCrypt Upgrade Bypasses Defenses

Security researchers have unveiled a new variant of the ransomware StopCrypt, also known as STOP. This iteration employs a complex, multistage execution process using shell codes to circumvent security tools, rendering the malware particularly...

RedCurl group

Hackers Abuse Windows Feature: RedCurl’s Stealthy Attack

Trend Micro has unveiled novel cyberattack methodologies employed by the RedCurl group, which manipulates a legitimate Windows component to execute malevolent commands. The Program Compatibility Assistant (PCA), designed to address compatibility issues with older...