Friday, January 10, 2025

Cyber Attack

Grasshopper Hackers Mimic As Penetration Testing Service To Deploy Malware

Hackers often mimic penetration testing services to disguise their malicious activities as legitimate security assessments. By imitating authorized security testing, attackers can exploit the trust...

New Hacker Group Attacking Systems With 10 Malware At Same Time

A malware campaign of huge magnitude, and perhaps run by just one group, is using artificially nested files for distribution named 'WEXTRACT.EXE     ...

Xeno RAT Attacking Users Via GitHub Repository And .gg Domains

Threat actors use RATs because they provide attackers with persistent access to compromised systems, enabling long-term espionage and exploitation.North Korean hackers and other actors...

Hackers Attacking Linux Cloud Servers To Gain Complete Control

Malware storage, distribution, and command and control (C2) operations are increasingly being used to leverage cloud services for recent cybersecurity threats. But, this complicates the...

OilRig Hackers Attacking Individuals And Organizations In The Middle East

OilRig is an Iranian-linked cyber espionage group that has been active since 2015, and this group is known for its sophisticated spear-phishing campaigns and...

New North Korean Actor Distributing Malicious npm Packages To Compromise Organizations

Early in 2024, North Korean threat actors persisted in using the public npm registry to disseminate malicious packages that were similar to those that...

Hackers Use Windows XSS Flaw To Execute Arbitrary Command In MMC Console

Attackers are leveraging a new infection technique called GrimResource that exploits MSC files.By crafting malicious MSC files, they can achieve full code execution...

Chinese Winnti Group Intensifies Financially Motivated Attacks

Hackers are increasingly executing financially motivated attacks and all due to the lucrative potential of monetizing the stolen data, ransoms, and fraudulent activities.The digital...