Search results for:
OceanLotus
Computer Security
OceanLotus(APT32) Threat Actor Group Deliver KerrDown Malware Via Word Document and RAR Archive
OceanLotus group known for Multiple attack campaigns around the globe, the threat actor group targets private sectors across multiple industries, foreign governments, activists, and...
Backdoor
OceanLotus APT Hacking Group Distributing Backdoor to Compromise Government Networks
OceanLotus APT group as know as s APT32 and APT-C-00, emerging again targeting organization and government networks by distributing backdoor to compromise their infrastructure.
Cyber...
APT
APT32 Turns GitHub into a Weapon Against Security Teams and Enterprise Networks
Southeast Asian Advanced Persistent Threat (APT) group OceanLotus, also known as APT32, has been identified as employing GitHub to conduct a sophisticated poison attack...
Cyber Security News
APT32 Hacker Group Attacking Cybersecurity Professionals Poisoning GitHub
The malicious Southeast Asian APT group known as OceanLotus (APT32) has been implicated in a sophisticated attack that compromises the privacy of cybersecurity professionals.
A...
Cyber Security News
Beware Of Malicious Chrome Extension That Delivers Weaponized ZIP Archive
In August 2024, researchers detected a malicious Google Chrome browser infection that led to the distribution of LummaC2 stealer malware that utilized a drive-by...
Cyber Attack
Russian APT Hackers Group Attack Government & Military Network Using Weaponized Word Documents
Researchers discovered a new malicious activity that involved by Russian APT hackers to attack Government and Military officials in Ukrainian entities.
The attacker's targets are...
Backdoor
New Hacking Group Using Metasploit To Install Backdoor Malware On Windows By Exploiting MS Office
Researchers detect a wave of malware campaigns from a new hacking group named TA2101 that targeting various organizations in German and Italy to deploy...
Computer Security
Hackers Embedded the Malicious Code Within WAV Audio Files to Gain Reverse Shell Access
Researchers observed a new malware campaign using WAV audio files to hide the malware and to avoid detection. Threat actors embedded the malicious code...