Hackers Launching Powerful Malware ExileRAT Via Weaponized Microsoft PowerPoint Document
Researchers observed a new malicious campaign that delivers a powerful ExileRAT malware via Microsoft powerpoint documents using previously used C2 server infrastructure.
Attackers deliver the malware via Email attachment and the Mail address represented...
SpeakUp – A New Undetected Backdoor Exploiting Six Linux Distributions With Known Vulnerabilities
A new trojan dubbed SpeakUp exploiting six different Linux distributions with know vulnerabilities. The campaign primarily targeting East Asia and Latin America, including AWS, hosted machines.
Security researchers from checkpoint detected the campaign that...
OceanLotus(APT32) Threat Actor Group Deliver KerrDown Malware Via Word Document and RAR Archive
OceanLotus group known for Multiple attack campaigns around the globe, the threat actor group targets private sectors across multiple industries, foreign governments, activists, and dissidents connected to Vietnam.
Palo Alto Networks’ Unit 42 division...
Hackers Offered IoT Botnet as Service “TheMoon” : Botnet-as-a-Service
TheMoon botnet was first identified in 2014 and it targets exploits on the router developed by companies such as Linksys, ASUS, MikroTik and D-Link.
The botnet operators used the proxy botnet for various activities...
Mac Malware Steals Cookies & saved Passwords when Users Visiting Crypto Exchange Service Websites
A new dangerous Mac Malware discovered that stealing the cookies when users visiting a website that belongs to cryptocurrency exchanges and wallet service along with saved credentials from Chrome Browers.
"Web cookies are...