Malware

Lazarus Hackers Using New VNC Based Malware To Attack Organizations WorldwideLazarus Hackers Using New VNC Based Malware To Attack Organizations Worldwide

Lazarus Hackers Using New VNC Based Malware To Attack Organizations Worldwide

The Lazarus Group has recently employed a sophisticated attack, dubbed "Operation DreamJob," to target employees in critical sectors like nuclear…

4 months ago
New Python NodeStealer Attacking Facebook Business To Steal Login CredentialsNew Python NodeStealer Attacking Facebook Business To Steal Login Credentials

New Python NodeStealer Attacking Facebook Business To Steal Login Credentials

NodeStealer, initially a JavaScript-based malware, has evolved into a more sophisticated Python-based threat that targets Facebook Ads Manager accounts, stealing…

4 months ago
Threat Actors Selling Nunu Stealer On Hacker ForumsThreat Actors Selling Nunu Stealer On Hacker Forums

Threat Actors Selling Nunu Stealer On Hacker Forums

A new malware variant called Nunu Stealer is making headlines after being advertised on underground hacker forums and Telegram channels. Priced at…

4 months ago
Hackers Weaponizing LNK Files To Create Scheduled Task And Deliver Malware PayloadHackers Weaponizing LNK Files To Create Scheduled Task And Deliver Malware Payload

Hackers Weaponizing LNK Files To Create Scheduled Task And Deliver Malware Payload

TA397, also known as Bitter, targeted a Turkish defense organization with a spearphishing email containing a RAR archive, which included…

4 months ago
New I2PRAT Malware Using encrypted peer-to-peer communication to Evade DetectionsNew I2PRAT Malware Using encrypted peer-to-peer communication to Evade Detections

New I2PRAT Malware Using encrypted peer-to-peer communication to Evade Detections

Cybersecurity experts are sounding the alarm over a new strain of malware dubbed "I2PRAT," which leverages encrypted peer-to-peer (P2P) communication…

4 months ago
APT-C-60 Hackers Penetrate Org’s Network Using a Weapanized Google Drive linkAPT-C-60 Hackers Penetrate Org’s Network Using a Weapanized Google Drive link

APT-C-60 Hackers Penetrate Org’s Network Using a Weapanized Google Drive link

The Japan Computer Emergency Response Team Coordination Center (JPCERT/CC) has confirmed an advanced cyber attack against organizations in Japan, believed…

5 months ago
New Meeten Malware Attacking macOS And Windows Users To Steal LoginsNew Meeten Malware Attacking macOS And Windows Users To Steal Logins

New Meeten Malware Attacking macOS And Windows Users To Steal Logins

A sophisticated crypto-stealing malware, Realst, has been targeting Web3 professionals, as the threat actors behind this campaign have employed AI-generated…

5 months ago
Russian BlueAlpha APT Exploits Cloudflare Tunnels to Distribute Custom MalwareRussian BlueAlpha APT Exploits Cloudflare Tunnels to Distribute Custom Malware

Russian BlueAlpha APT Exploits Cloudflare Tunnels to Distribute Custom Malware

BlueAlpha, a Russian state-sponsored group, is actively targeting Ukrainian individuals and organizations by using spearphishing emails with malicious HTML attachments…

5 months ago
Poison Ivy APT Launches Continuous Cyber Attack on Defense, Gov, Tech & Edu SectorsPoison Ivy APT Launches Continuous Cyber Attack on Defense, Gov, Tech & Edu Sectors

Poison Ivy APT Launches Continuous Cyber Attack on Defense, Gov, Tech & Edu Sectors

Researchers uncovered the resurgence of APT-C-01, also known as the Poison Ivy group, an advanced persistent threat organization notorious for…

5 months ago
SMOKEDHAM Backdoor Mimic As Legitimate Tools Leveraging Google Drive & DropboxSMOKEDHAM Backdoor Mimic As Legitimate Tools Leveraging Google Drive & Dropbox

SMOKEDHAM Backdoor Mimic As Legitimate Tools Leveraging Google Drive & Dropbox

UNC2465, a financially motivated threat actor, leverages the SMOKEDHAM backdoor to gain initial access to target networks, which are often…

5 months ago