Cryptocurrency hack
New Meeten Malware Attacking macOS And Windows Users To Steal Logins
A sophisticated crypto-stealing malware, Realst, has been targeting Web3 professionals, as the threat actors behind this campaign have employed AI-generated content to create fake companies, such as "Meetio," to...
Cryptocurrency hack
Beware Of Malicious PyPI Packages That Inject infostealer Malware
Recent research uncovered a novel crypto-jacking attack targeting the Python Package Index (PyPI), where malicious actors uploaded a legitimate-seeming cryptocurrency client package, "aiocpa," to...
Android
New Android Malware SpyAgent Taking Screenshots Of User’s Devices
SpyAgent, a newly discovered Android malware, leverages OCR technology to extract cryptocurrency recovery phrases from screenshots stored on infected devices. By stealthily capturing screenshots, the...
Cryptocurrency hack
North Korean Hackers Employing New Tactic To Acruire Remote Jobs
North Korean threat actors behind the Contagious Interview and WageMole campaigns have refined their tactics, enhancing the obfuscation of their scripts to evade detection. InvisibleFerret...
Cryptocurrency hack
Critical Atlassian Vulnerability Exploited To Connect Servers In Mining Networks
Hackers usually shift their attention towards Atlassian due to flaws in its software, especially in products like Confluence, which put organizations' private data at...
Cryptocurrency hack
Log4j Vulnerability Exploited Again To Deploy Crypto-Mining Malware
Recent attacks exploit the Log4j vulnerability (Log4Shell) by sending obfuscated LDAP requests to trigger malicious script execution, which establishes persistence, gathers system information, and...
Cryptocurrency hack
Hackers Abused StackExchange Platform To Deliuver Malicious Python Package
Attackers uploaded malicious Python packages targeting Raydium and Solana users to PyPI, leveraging a StackExchange post to distribute the malware. The multi-stage malware stole sensitive...
Cryptocurrency hack
Beware Of Malicious Crypto Management App That Drains Your Wallet
A forwarded Telegram video advertises heavily discounted, high-profile cryptocurrency projects, enticing viewers with links to a seemingly legitimate second-tier exchange and a concealed malicious...
Cryptocurrency hack
ViperSoftX Weaponizing AutoIt & CLR For Stealthy PowerShell Execution
ViperSoftX is an advanced malware that has become more complicated since its recognition in 2020, to the extent that eBooks are used on Torrent...
Cryptocurrency hack
Hackers Employing New Techniques To Attack Docker API
Attackers behind Spinning YARN launched a new cryptojacking campaign targeting publicly exposed Docker Engine hosts by using new binaries chkstart (remote access with payload...
Cryptocurrency hack
8220 Gang Exploiting Oracle WebLogic Server Flaw To Deploy Cryptominer
The Oracle WebLogic Server vulnerabilities enable hackers to access unauthorized systems that are used for business data and applications. This can enable threat actors to...