Monday, February 10, 2025

Malware

Catch the Unknown Cyber-Attacks with Threat Hunting

The "reactive trend" of Cyberthreat monitoring is a very essential issue since it demonstrates that most organizations don't hunt until the event is identified....

PgMiner Botnet Attacks PostgreSQL Databases to Install a Cryptocurrency Miner

Unit 42 researchers at Paloalto discovered a cryptocurrency mining botnet named “PGMiner”. It is a Linux based cryptocurrency botnet that exploits a disputed PostgreSQL...

Adrozek Malware Silently Hijacks Microsoft Edge, Google Chrome, Yandex, and Firefox Browsers

Google Chrome, Firefox, Microsoft Edge, and Yandex have become the most recent targets of an ongoing malware campaign, called Adrozek, as disclosed by Microsoft.The malware injects ads...

Facebook Takedown Infrastructure of Hacker Groups Targeting Various Government Entities

Bangladesh and Vietnam based hackers were caught by Facebook recently for hacking into its users’ accounts and taking control of the pages. APT32, a...

Russian APT28 Hackers Uses COVID-19 Lures to Deliver Zebrocy Malware via VHD File

The security firm Intezer revealed COVID-19 phishing lures that were used to deliver the Go version of Zebrocy. Zebrocy is mainly used against governments and...

DeathStalker Hacker Group’s New PowerPepper Malware Evade Antivirus Detection to Bypass Windows

Researchers uncovered a new Malvertising campaign PowerPepper from DeathStalker threat actor group that is active since 2012, and actively attacking various organizations around the...

New malicious NPM packages Used by Attackers Install njRAT Remote Access Trojan

No, not the one that nibbles at your Thanksgiving leftovers. RAT, Remote Access Trojan, is a type of malware that enables attackers to take...

Carding Action 2020 – Crooks selling/purchasing Compromised Card Data Arrested

We, at GBhackers usually report instances where the bad guys have had the upper hand in cyber-security, but today we are glad to report...