Tuesday, March 18, 2025
Search results for:

AZORult

New AZORult Malware Spreading Via Office Documents Steals to Credentials & Launch Ransomware Attack

Threat actors behind AZORult malware released an updated version with improvements on both the stealer and the downloader functionalities. Within a day after the...

Earth Koshchei Employs RDP Relay, Rogue RDP server in Server Attacks

 A new cyber campaign by the advanced persistent threat (APT) group Earth Koshchei has brought rogue Remote Desktop Protocol (RDP) attacks to the forefront...

DCRAt Attacking Users Via HTML Smuggling To Steal Login Credentials

In a new campaign that is aimed at users who speak Russian, the modular remote access tool (RAT) known as DCRat has been utilized.  Delivered...

Phishing with Cloudflare Workers: Transparent Phishing and HTML Smuggling

Phishing campaigns are abusing Cloudflare workers in two ways, where one injects malicious content hidden by HTML smuggling, similar to Azorult malware.  The other uses...

Linux Admins Beware! Fake PuTTY Client that Installs Rhadamanthys stealer

A malvertising campaign has been discovered deploying a fake PuTTY client to deliver the Rhadamanthys stealer, a dangerous malware. This campaign cleverly exploits the...

North Korea’s Kimsuky Group Equipped to Exploit Windows Help files

Cybersecurity experts have uncovered a sophisticated cyber espionage campaign orchestrated by the North Korean threat actor group Kimsuky, Black Banshee, or Thallium. This group,...

New Medusa Stealer Attacking Users to Steal Login Credentials

While the world celebrated Christmas, the cybercrime underworld feasted on a different kind of treat: the release of Meduza 2.2, a significantly upgraded password...

RCE Bug in Microsoft RDP Protocol Let Hackers Perform WannaCry Level Attack on 3 Million Vulnerable Endpoints

A critical remote execution vulnerability in Microsoft remote desktop services enables RDP Protocol let attackers compromise the vulnerable system with WannaCry-level malware. Microsoft recently fixed...