Articles

Illinois state acknowledges possible data breach 10 months after incident

The information that potentially could have been accessed in a limited number of accounts included system-generated notices and documents containing… Read More

3 years ago

Water Basilisk Attack Campaign Uses New HCrypt Variant to Flood Victims with RAT Payloads

The attacker used publicly available file hosting services such as “archive.org”, “transfer.sh”, and "discord.com", to host the malware while hacked… Read More

3 years ago

APT-C-36 Updates Its Long-term Spam Campaign Against South American Entities With Commodity RATs

APT-C-36 has been known to send phishing emails to various entities in South America using publicly available remote access tools… Read More

3 years ago

APT41 Identifies as Earth Baku in New Cyberespionage Campaign Employing ScrambleCross Backdoor

This cyberespionage campaign uses previously unidentified shellcode loaders, which we have named StealthVector and StealthMutant, and a backdoor, which we… Read More

3 years ago

Cinobi Banking Trojan Targets Japanese Cryptocurrency Exchange Users via Malvertising Campaign

The malicious app abused sideloading flaws to load and start the Cinobi banking trojan. This is a new campaign from… Read More

3 years ago

BIOPASS RAT New Malware Sniffs Victims via Live Streaming

BIOPASS RAT possesses features such as file system assessment, remote desktop access, file exfiltration, and shell command execution. It can… Read More

3 years ago

PurpleFox Using WPAD to Target Indonesian Users

This time, PurpleFox EK is making use of WPAD domains to infect users. While a WPAD abuse attack is a… Read More

3 years ago

Nefilim Ransomware Attack Through a MITRE Att&ck Lens

It is operated by a group tracked under the intrusion set "Water Roc". This group combines advanced techniques with legitimate… Read More

3 years ago

Bash Ransomware DarkRadiation Targets Red Hat and Debian-based Linux Distributions

Most components of this ransomware attack mainly target Red Hat and CentOS Linux distributions; however, in some scripts, Debian-based Linux… Read More

3 years ago

Deepfakes Are Getting Closer to Reality

Several positive steps continue to be taken by organizations such as the European Union and the U.S. FTC to curb… Read More

3 years ago

Tor-Based Botnet Malware Targets Linux Systems, Abuses Cloud Management Tools

As Linux attracts more attention from malicious actors, researchers have seen threats evolving — abusing services like Ngrok and using… Read More

3 years ago