Computer Security
LightlessCan Backdoor Deployed by North Korean Lazarus APT
The Lazarus Group, a hacker collective operating out of North Korea, has employed a new form of advanced malware in their deceptive job scams, which researchers caution is significantly harder to detect than its... Read more
ShadowSyndicate - the New APT That is Behind Seven Ransomware Strains
Cybersecurity experts have revealed the existence of a new cybercriminal group known as ShadowSyndicate, previously identified as Infra Storm. This group is suspected of having utilized up to seven different... Read more
HTTPSnoop Malware Targets Middle East
In the Middle East, telecommunication service providers have become the focus of a new intrusion operation known as ShroudedSnooper. This operation utilizes a covert backdoor called HTTPSnoop. According to a report... Read more
New Infostealing MetaStealer Malware Targets Macs
A new information-stealing malware, named MetaStealer, has shifted its focus to Apple's macOS, adding to the growing list of information-stealing malware families that specifically target this operating system. Prior... Read more
Mirai Variant 'Pandora' Used to Hijack Androiv TVs
A variant of the Mirai botnet, known as Pandora, has been observed infiltrating low-cost Android-based TV sets and TV boxes to use them as part of a botnet for conducting distributed denial-of-service (DDoS) attacks.... Read more
SapphireStealer Sold for $50 Per Month on the Dark Web
A malware known as SapphireStealer, built on the open-source .NET framework, is being utilized by various groups to enhance its functionality and create customized versions for their specific needs. According to a... Read more
Deadglyph Backdoor Deployed by Stealth Falcon APT
Cybersecurity experts have unearthed an advanced covert backdoor called Deadglyph, which was previously undiscovered and utilized by the threat actor Stealth Falcon as part of a cyber espionage operation. In a recent... Read more
Chinese APT Targets South Korea in Multi-Year Campaign
There has been an extensive Chinese state-sponsored cyber espionage effort spanning multiple years, targeting South Korean academic, political, and governmental entities. The Insikt Group from Recorded Future,... Read more
NodeStealer Takes Aim at Business Accounts on Facebook
In an ongoing campaign, Facebook Business accounts are being targeted with deceptive messages aimed at collecting victims' credentials. These messages are part of a campaign utilizing a variant of the Python-based... Read more
Vietnamese Hackers Phish for Victims Using Messenger
A recent phishing attack is utilizing Facebook Messenger to distribute messages containing harmful attachments. These messages are sent from a large number of fabricated and compromised personal accounts, with the... Read more
SuperBear Trojan Deployed Against South Korean Targets
A recent phishing attack, possibly aimed at civil society organizations in South Korea, has uncovered an innovative remote access trojan called SuperBear. The breach specifically targeted an unnamed activist who, in... Read more
Infamous Chisel Malware Targets Ukraine
The UK's National Cyber Security Centre (NCSC) and its allies within the Anglophone Five Eyes intelligence alliance have officially attributed a series of cyber attacks against Ukrainian military targets to the... Read more
ZenRAT Malware Distributed by Spoofing Legitimate App
A new type of malicious software known as ZenRAT has surfaced in the wild. It is distributed through deceptive installation packages that mimic a legitimate password manager application. Enterprise security firm... Read more
Phishing Campaign Targets Ukrainian Military Entities
Ukrainian military organizations have become the focal point of a phishing campaign that exploits drone manuals to deliver a Go-based open-source post-exploitation toolkit named Merlin. Securonix researchers Den... Read more
Tremendous Botnet Spreads on Android Devices
Tremendous Banking Botnet, designed specifically for Android devices, is a highly adaptable form of malware with a wide range of capabilities. These include automated execution of commands, the injection of malicious... Read more
Atomic Stealer Mac Malware Distributed Through Malvertising
A recent malvertising campaign has been detected, distributing an updated version of macOS theft malware known as Atomic Stealer or AMOS, indicating active maintenance by its creator. Atomic Stealer, a readily... Read more
Comprehensive Guide to Back-to-School Cybersecurity 2023
As students return to school in 2023, it's crucial to prioritize cybersecurity to protect personal information, academic data, and online safety. This comprehensive guide will provide tips and best practices for... Read more
MMRat Mobile Malware Targets Android Devices
An Android banking trojan referred to as MMRat, which had not been previously identified, has been detected in Southeast Asia since late June 2023. This trojan, named after its unique package name "com.mm.user," is... Read more