exfiltration

Exmatter Tool Expedites BlackMatter’s Data Exfiltration

BlackMatter ransomware group included a new data exfiltration tool called Exmatter to hasten its information-stealing process from victims' networks. The… Read More

3 years ago

Osteopathic Professional Group Reports Year-Old Breach

The American Osteopathic Association has just begun notifying nearly 28,000 individuals about a June 2020 data exfiltration incident involving their… Read More

3 years ago

Novel Data Exfiltration Mechanism Uses Ethernet Cables to Siphon Sensitive Data from Air-Gapped Systems

Dubbed "LANtenna Attack," the novel technique enables malicious code in air-gapped computers to amass sensitive data and then encode it… Read More

3 years ago

Hunting the LockBit Gang's Exfiltration Infrastructures – Yoroi

During the last few months, the LockBit gang decided to develop and evolve a custom tool specialized in data exfiltration… Read More

3 years ago

QueenSono – Golang Binary For Data Exfiltration With ICMP Protocol

QueenSono tool only relies on the fact that ICMP protocol isn't monitored. It is quite common. It could also been… Read More

3 years ago

BazaCall: Phony call centers lead to exfiltration and ransomware

If a target recipient does decide to call the phone number indicated in the email, they will speak with a… Read More

3 years ago

Magecart Hackers Hide Stolen Credit Card Data Into Images for Evasive Exfiltration

Cybercrime actors part of the Magecart group have latched on to a new technique of obfuscating the malware code within comment… Read More

3 years ago

Lucifer – A Powerful Penetration Tool For Automating Penetration Tasks Such As Local Privilege Escalation, Enumeration, Exfiltration And More…

A Powerful Penetration Tool For Automating Penetration Tasks Such As Local Privilege Escalation, Enumeration, Exfiltration and More... Use Or Build… Read More

3 years ago

Server Side Data Exfiltration via Telegram API

One interesting technique researchers have come across in recent months leverages the Telegram API to exfiltrate stolen data and send… Read More

3 years ago

Google Chrome sync feature can be abused for C&C and data exfiltration

Threat actors have discovered they can abuse the Google Chrome sync feature to send commands to infected browsers and steal… Read More

3 years ago

Maze Ransomware: Exfiltration and Extortion

 New research by New Zealand organization Emsisoft has discovered that a cyber-blackmail tactic initially debuted by ransomware gang MAZE has… Read More

3 years ago

MAZE Exfiltration Tactic Widely Adopted

New research by New Zealand company Emsisoft has found that a cyber-blackmail tactic first debuted by ransomware gang MAZE has… Read More

3 years ago