attacker

GC2 – Command and Control application that allows an attacker to execute commands on the target machine using Google Sheet and exfiltrate data using Google Drive

GC2 (Google Command and Control) is a Command and Control application that allows an attacker to execute commands on the… Read More

3 years ago

GC2 – A Command And Control Application That Allows An Attacker To Execute Commands On The Target Machine Using Google Sheet And Exfiltrate Data Using Google Drive

GC2 (Google Command and Control) is a Command and Control application that allows an attacker to execute commands on the… Read More

3 years ago

Unknown Attacker Chains Chrome and Windows Zero-Days

Security researchers warn of a series of highly targeted attacks, by a group dubbed as “PuzzleMaker”, designed to compromise victim… Read More

3 years ago

Back in a Bit: Attacker Use of the Windows Background Intelligent Transfer Service

When malicious applications create BITS jobs, files are downloaded or uploaded in the context of the service host process. This… Read More

3 years ago

Meet Babuk, a ransomware attacker blamed for the Serco breach

The ransomware gang, dubbed Babuk after its strain of code, is a case study in how quickly crooks can learn… Read More

3 years ago

Operation ElectroRAT: Attacker Creates Fake Companies to Drain Your Crypto Wallets

Already with thousands of victims. Intro With Bitcoin on the rise and a market exceeding billions of dollars, cryptocurrency has attracted threat… Read More

3 years ago

Leaky Server Exposes 12 Million Healthcare Records to Meow Attacker

The enterprise leaked 12 million documents on sufferers such as highly delicate diagnoses, before the uncovered cloud server was struck… Read More

3 years ago

Highly Evasive Attacker Leverages SolarWinds Supply Chain to Compromise Multiple Global Victims With SUNBURST Backdoor

The attacker’s article-compromise action leverages numerous techniques to evade detection and obscure their activity, but these endeavours also supply some… Read More

3 years ago

ImageMagick PDF-parsing flaw allowed attacker to execute shell commands via maliciously crafted image

Alex Inführ found a new shell injection vulnerability relevant to the parsing of PDF files by ImageMagick whilst investigating ‘ImageTragick’,… Read More

3 years ago

Cryptocurrency Service Proposes Bug Bounty to Attacker Who Stole…

According to the cryptocurrency lending and cost savings provider, a protocol vulnerability authorized the attacker to siphon the cash devoid… Read More

3 years ago

Georgia Election Data Hit in Ransomware Attack

Despite the fact that the county explained the voting system hasn’t been impacted by the ransomware attack, the incident is… Read More

4 years ago