Backdoor
TA505 Hacking Group Launching New Malware ServHelper via Weaponized MS Word Documents
TA505 threat actors currently launching new malware campaign with a backdoor capability that mainly target the financial institutions via MS Word Documents.TA505 hacking...
Backdoor
TA505 Cyber Threat Actors Installing Remote Monitoring Tool via Weaponized MS Word Document
Cyber Criminals from TA505 group started a new campaign that targeting retail, grocery, and restaurant chains by distributing weaponized MS word documents.TA505 group already...
Backdoor
Hackers Steal Over $800,000 By Dropping a Malware On Cod Community College Computer Systems
The Cape Cod Community College suffered a massive cyber attack, the attackers steal college banking information and allegedly transfer $807,130 from College. The attack...
Backdoor
Hackers Distributing PowerShell-based Backdoor Via MS Office document That Shares Stolen Data Via C&C Sever
Researchers observed a new Powershell based backdoor via Microsoft office document that infects similar to MuddyWater threat actor hacking tools to steal victims sensitive...
Android
Lazarus Hackers Group Attack Financial Organizations using a Powerful Backdoor
Widely active cyber criminal group Lazarus targeting financial organizations across Latin America by installing a backdoor into the targeting systems.Same hacking groups already targeted...
Backdoor
Beware !! Worlds Most Active Malware Emotet Launching New Campaign With Malicious Word and PDF Attachments
Threat actors now launching a new malicious spam campaign since November 5 since then actively spike to target corporate network and individuals.Emotet banking malware is...
Backdoor
Outlaw Hacking Group Using Command Injection Flow To Attack Organizations Network using Botnet via C&C Server
Outlaw Hacking group uses command injection vulnerability in IoT devices and Linux servers to distribute botnets. The threat actors compromised the FTP servers of...
Backdoor
BLEEDINGBIT – Two Bluetooth Chip-level Vulnerabilities Affected Millions of Enterprise Wi-Fi Access Point Devices
Researcher's discovered 2 critical Bluetooth vulnerabilities in BLE (Bluetooth Low Energy) is named as " BLEEDINGBIT " affected millions of BLE embedded devices that...