Thursday, January 30, 2025

Backdoor

TA505 Hacking Group Launching New Malware ServHelper via Weaponized MS Word Documents

TA505 threat actors currently launching new malware campaign with a backdoor capability that mainly target the financial institutions via MS Word Documents.TA505 hacking...

TA505 Cyber Threat Actors Installing Remote Monitoring Tool via Weaponized MS Word Document

Cyber Criminals from TA505 group started a new campaign that targeting retail, grocery, and restaurant chains by distributing weaponized MS word documents.TA505 group already...

Hackers Steal Over $800,000 By Dropping a Malware On Cod Community College Computer Systems

The Cape Cod Community College suffered a massive cyber attack, the attackers steal college banking information and allegedly transfer $807,130 from College. The attack...

Hackers Distributing PowerShell-based Backdoor Via MS Office document That Shares Stolen Data Via C&C Sever

Researchers observed a new Powershell based backdoor via Microsoft office document that infects similar to MuddyWater threat actor hacking tools to steal victims sensitive...

Lazarus Hackers Group Attack Financial Organizations using a Powerful Backdoor

Widely active cyber criminal group Lazarus targeting financial organizations across Latin America by installing a backdoor into the targeting systems.Same hacking groups already targeted...

Beware !! Worlds Most Active Malware Emotet Launching New Campaign With Malicious Word and PDF Attachments

Threat actors now launching a new malicious spam campaign since November 5 since then actively spike to target corporate network and individuals.Emotet banking malware is...

Outlaw Hacking Group Using Command Injection Flow To Attack Organizations Network using Botnet via C&C Server

Outlaw Hacking group uses command injection vulnerability in IoT devices and Linux servers to distribute botnets. The threat actors compromised the FTP servers of...

BLEEDINGBIT – Two Bluetooth Chip-level Vulnerabilities Affected Millions of Enterprise Wi-Fi Access Point Devices

Researcher's discovered 2 critical Bluetooth vulnerabilities in BLE (Bluetooth Low Energy)  is named as " BLEEDINGBIT " affected millions of BLE embedded devices that...