top of page

The Cyber Security Blog
Cyber Attack's, Malware, CVE's and more.


Dead or Alive? An Emotet Story
A look back at the Emotet malware intrusion from May 2022 and the post-exploitation framework used by threat actors to launch a Cobalt...
Sep 12, 20221 min read
Â
Â


Comprehensive Threat Intelligence: MagicRAT: Lazarus’
Cisco Talos has discovered a new remote access trojan (RAT), which we are calling "MagicRAT," that we are attributing with moderate to...
Sep 9, 20221 min read
Â
Â


APT42: Crooked Charms, Cons and Compromises
Active since at least 2015, APT42 is characterized by highly targeted spear phishing and surveillance operations against individuals and...
Sep 8, 20222 min read
Â
Â


Mirai Variant MooBot Targeting D-Link Devices
Unit 42 researchers have identified vulnerabilities in older D-Link routers and other devices that could be used to spread malware and...
Sep 8, 20221 min read
Â
Â


#StopRansomware: Vice Society
Vice Society is an intrusion, exfiltration, and extortion hacking group that first appeared in summer 2021. Vice Society actors do not...
Sep 8, 20221 min read
Â
Â


Raspberry Robin and Dridex: Two Birds of a Feather
Raspberry Robin, also known as the QNAP worm, is typically delivered by a USB device, which contains a malicious Microsoft shortcut...
Sep 6, 20221 min read
Â
Â


EvilProxy Phishing-as-a-Service with MFA Bypass Emerged in Dark Web
Resecurity has identified a new underground service that allows cybercriminals to bypass 2FA authentication (MFA) authentication...
Sep 6, 20221 min read
Â
Â


Worok: The big picture
ocused mostly on Asia, this new cyberespionage group uses undocumented tools, including steganographically extracting PowerShell payloads...
Sep 6, 20221 min read
Â
Â


SafeBreach Uncovers New Remote Access Trojan (RAT)
A previously undiscovered remote access trojan (RAT) is being used to target Farsi-speaking code developers in Iran. Dubbed CodeRAT, the...
Sep 6, 20221 min read
Â
Â


PyPI Phishing Campaign | JuiceLedger Threat Actor Pivots From Fake Apps to Supply Chain Attacks
JuiceLedger operators have actively targeted PyPi package contributors in a phishing campaign, successfully poisoning at least two...
Sep 6, 20221 min read
Â
Â


Deep Dive into a Corporate Espionage Operation
Bitdefender analyzed a recent industrial espionage operation targeting a small (under 200 employees) technology company based in the...
Sep 6, 20221 min read
Â
Â


ModernLoader delivers multiple stealers, cryptominers and RATs
Cisco Talos recently observed three separate, but related, campaigns between March and June 2022 delivering a variety of threats,...
Sep 6, 20221 min read
Â
Â


New Golang Attack Campaign Leverages Office Macros and James Webb Images to Infect Systems
The Securonix Threat research team has recently identified a unique sample of a persistent Golang-based attack campaign tracked by...
Sep 6, 20221 min read
Â
Â


Mini Stealer: Possible Predecessor of Parrot Stealer
A threat actor has released the source code of Parrot Stealer, which is suspected to be the predecessor to MiniStealer, which can easily...
Sep 6, 20221 min read
Â
Â


Rising Tide: Chasing the Currents of Espionage in the South China Sea
Proofpoint and PwC Threat Intelligence have jointly identified a cyber espionage campaign, active since April 2022 through June,...
Sep 6, 20221 min read
Â
Â


Crypto Miner malware disguised as Google translate desktop and other legitimate applications
Active since 2019, Nitrokod is a Turkish-speaking software developer that claims to offer free and safe software. Most of the programs...
Sep 6, 20221 min read
Â
Â


Remcos RAT New TTPS
Remcos is a remote access trojan – a malware used to take remote control over infected PCs.This trojan is created and sold to clients by...
Sep 6, 20221 min read
Â
Â


PureCrypter Loader continues to be active and has spread to more than 10 other families
PureCrypter is a MaaS typeloader saw some time ago, which has been very active this year, and has promoted more than 10 other families,...
Sep 6, 20221 min read
Â
Â


MERCURY leveraging Log4j 2 vulnerabilities in unpatched systems to target Israeli organizations
Microsoft Threat Intelligence Center (MSTIC) and Microsoft 365 Defender Research Team detected Iran-based threat actor MERCURY leveraging...
Sep 6, 20221 min read
Â
Â


BlueSky Ransomware. AD Lateral Movement, Evasion and Fast Encryption Put Threat on the Radar
BlueSky ransomware is an emerging threat that researchers have been paying increasing attention to since its initial discovery in late...
Sep 6, 20221 min read
Â
Â
bottom of page
