Category: Malware

PhantomBlu

Beware PhantomBlu: Phishing Campaign Targets US Businesses

The Israeli cybersecurity firm Perception Point has unveiled details of a new phishing campaign targeting American organizations. The operation, code-named PhantomBlu, aims to infiltrate systems with the NetSupport RAT, a malicious version of the...

AcidRain

AcidPour: New Linux Wiper Threat Targets x86 Devices

Security researchers at SentinelLabs have uncovered a new variant of the wiper, AcidRain, meticulously engineered for assaults on Linux x86 devices. Dubbed AcidPour, this malicious entity manifests as a binary ELF file, tailored for...

DEEP#GOSU campaign

DEEP#GOSU Exposed: New Cyber Espionage Campaign

The cybersecurity firm Securonix has uncovered a new campaign in which hackers employ sophisticated techniques to infiltrate Windows computers and exfiltrate confidential data. Named DEEP#GOSU, the campaign is believed to be linked to the...

ITG05 phishing campaigns

ITG05 Strikes: Global Phishing Campaign Exposed

IBM X-Force reports a series of phishing campaigns by ITG05, involving the distribution of counterfeit documents purporting to be from governmental and non-governmental organizations across Europe, the Caucasus, Central Asia, and both North and...

gitgub campaign

Gitgub Campaign: Info Stealer Targets GitHub Users

Security researchers have uncovered multiple repositories on GitHub distributing malicious software under the guise of cracked versions of popular software. In a malicious operation dubbed “gitgub,” specialists from the German company G DATA identified...

trojanized Notepad++

Chinese Users Targeted: Notepad++ Search Results Poisoned

In recent research, it was revealed that Chinese users seeking official versions of software like Notepad++ and VNote through search engines such as Baidu are increasingly falling victim to cunning cybercriminals. The attacks are...

StopCrypt ransomware

Ransomware Alert: StopCrypt Upgrade Bypasses Defenses

Security researchers have unveiled a new variant of the ransomware StopCrypt, also known as STOP. This iteration employs a complex, multistage execution process using shell codes to circumvent security tools, rendering the malware particularly...

Senator Wyden Exposes Backdoor Codes in Safe Locks

Senator Wyden Exposes Backdoor Codes in Safe Locks

According to a recent article by 404 Media, U.S. Senator Ron Wyden has accused two of the largest manufacturers of commercial safe locks, SECURAM and Sargent and Greenleaf (S&G), of embedding backdoor codes in...

VCURMS RAT

Vcurms RAT: New Attack Targets Java Systems

Fortinet’s FortiGuard Labs has unearthed a grave cyber threat dubbed Vcurms RAT, crafted by malefactors who employ email as a command-and-control center and utilize public services such as AWS and GitHub for harboring malicious...

BIPClip

BIPClip Malware: A New Threat to Crypto Developers

Recently, the Python Package Index (PyPI) repository uncovered seven packages engineered for the theft of BIP39 mnemonic phrases, which are utilized for the restoration of private keys in cryptocurrency wallets. This operation, dubbed BIPClip...

TPG Telecom Data breach Traffic enforcement Airline Outage SharePoint Exploitation SharePoint Zero-Day Crypto Exchange Hack Solana Exploit Houken TeleMessage TM SGNL Mobile Security Salt Typhoon Kansas State University cyberattack

BianLian Exploits TeamCity Flaws for Ransomware

GuidePoint Security, a cybersecurity firm, has uncovered that the BianLian group is exploiting vulnerabilities in the JetBrains TeamCity software to carry out ransomware attacks. Experts have documented a sequence of attacks initiated through the...

Snake Python infostealer

Beware! Snake Infostealer Targets Facebook Users

Cybereason has identified a new malware variant named Snake, which proliferates through Facebook messages. This Python-written infostealer is designed to pilfer confidential user data. The stolen data are transmitted across various platforms, including Discord,...