Malware

New Stealthy Malware Leveraging SSH Over TOR Attacking Ukrainian MilitaryNew Stealthy Malware Leveraging SSH Over TOR Attacking Ukrainian Military

New Stealthy Malware Leveraging SSH Over TOR Attacking Ukrainian Military

Researchers recently discovered a malicious campaign targeting Ukrainian military personnel through fake "Army+" application websites, which host a malicious installer…

5 months ago
New ‘OtterCookie’ Malware Attacking Software Developers Via Fake Job OffersNew ‘OtterCookie’ Malware Attacking Software Developers Via Fake Job Offers

New ‘OtterCookie’ Malware Attacking Software Developers Via Fake Job Offers

Palo Alto Networks reported the Contagious Interview campaign in November 2023, a financially motivated attack targeting various organizations, unlike typical…

5 months ago
Skuld Malware Using Weaponized Windows Utilities Packages To Deliver MalwareSkuld Malware Using Weaponized Windows Utilities Packages To Deliver Malware

Skuld Malware Using Weaponized Windows Utilities Packages To Deliver Malware

Researchers discovered a malware campaign targeting the npm ecosystem, distributing the Skuld info stealer through malicious packages disguised as legitimate…

5 months ago
Malicious Apps On Amazon Appstore Records Screen And Interecpt OTP VerificationsMalicious Apps On Amazon Appstore Records Screen And Interecpt OTP Verifications

Malicious Apps On Amazon Appstore Records Screen And Interecpt OTP Verifications

A seemingly benign health app, "BMI CalculationVsn," was found on the Amazon App Store, which secretly collected sensitive user data,…

5 months ago
Lazarus Hackers Using New VNC Based Malware To Attack Organizations WorldwideLazarus Hackers Using New VNC Based Malware To Attack Organizations Worldwide

Lazarus Hackers Using New VNC Based Malware To Attack Organizations Worldwide

The Lazarus Group has recently employed a sophisticated attack, dubbed "Operation DreamJob," to target employees in critical sectors like nuclear…

5 months ago
New Python NodeStealer Attacking Facebook Business To Steal Login CredentialsNew Python NodeStealer Attacking Facebook Business To Steal Login Credentials

New Python NodeStealer Attacking Facebook Business To Steal Login Credentials

NodeStealer, initially a JavaScript-based malware, has evolved into a more sophisticated Python-based threat that targets Facebook Ads Manager accounts, stealing…

5 months ago
Threat Actors Selling Nunu Stealer On Hacker ForumsThreat Actors Selling Nunu Stealer On Hacker Forums

Threat Actors Selling Nunu Stealer On Hacker Forums

A new malware variant called Nunu Stealer is making headlines after being advertised on underground hacker forums and Telegram channels. Priced at…

5 months ago
Hackers Weaponizing LNK Files To Create Scheduled Task And Deliver Malware PayloadHackers Weaponizing LNK Files To Create Scheduled Task And Deliver Malware Payload

Hackers Weaponizing LNK Files To Create Scheduled Task And Deliver Malware Payload

TA397, also known as Bitter, targeted a Turkish defense organization with a spearphishing email containing a RAR archive, which included…

5 months ago
New I2PRAT Malware Using encrypted peer-to-peer communication to Evade DetectionsNew I2PRAT Malware Using encrypted peer-to-peer communication to Evade Detections

New I2PRAT Malware Using encrypted peer-to-peer communication to Evade Detections

Cybersecurity experts are sounding the alarm over a new strain of malware dubbed "I2PRAT," which leverages encrypted peer-to-peer (P2P) communication…

5 months ago
APT-C-60 Hackers Penetrate Org’s Network Using a Weapanized Google Drive linkAPT-C-60 Hackers Penetrate Org’s Network Using a Weapanized Google Drive link

APT-C-60 Hackers Penetrate Org’s Network Using a Weapanized Google Drive link

The Japan Computer Emergency Response Team Coordination Center (JPCERT/CC) has confirmed an advanced cyber attack against organizations in Japan, believed…

5 months ago