top of page

The Cyber Security Blog
Cyber Attack's, Malware, CVE's and more.


New Activities of Patchwork APT in South Asia
Patchwork is a South Asian APT organization that has been active since December 2015. The organization has been conducting cyber attacks...
Aug 19, 20221 min read


SEABORGIUM’s phishing operations
The Microsoft Threat Intelligence Center (MSTIC) has observed and taken actions to disrupt campaigns launched by SEABORGIUM, an actor...
Aug 19, 20221 min read


Shuckworm: Russia-Linked Group Maintains Ukraine Focus
Recent Shuckworm activity observed and aimed at Ukraine appears to be delivering information-stealing malware to targeted networks. This...
Aug 19, 20221 min read


The Anatomy of Wiper Malware, Part 1: Common Techniques
A wiper is a type of malware with a single purpose: to erase user data beyond recoverability. Wipers are used to destroy computer...
Aug 19, 20221 min read


LuckyMouse uses a backdoored Electron app to target MacOS
LuckyMouse, a Chinese-based cyber-espionage group, is targeting MacOS users in 2022 with a surveillance tool. REFERENCES:...
Aug 19, 20221 min read


Operation(loyalty) mercenary: a torrent of steel trapped in the plains of Eastern Europe
Qi Anxin Threat Intelligence Center has been keeping a high-intensity track on Russian-speaking threat actors and active underground...
Aug 19, 20221 min read


CopperStealer Distributes Malicious Chromium-based Browser Extension to Steal Cryptocurrencies
TrendMicro published their analyses on CopperStealer distributing malware by abusing various components such as browser stealer, adware...
Aug 19, 20221 min read


Bitter APT group using Dracarys Android Spyware
Researchers from Cyble Research Labs have identified the Bitter APT group delivering Android Spyware “Dracarys” to users of the Signal...
Aug 19, 20221 min read


Cisco Talos shares insights related to recent cyber attack on Cisco
A series of sophisticated voice phishing attacks was used to gain access to Cisco’s virtual private network (VPN) in 2022, the company...
Aug 19, 20221 min read


APT31 renews its attacks on Russian companies through cloud storage
A guide to the latest developments in the fight against cyber-thieves APT31, who are believed to be targeting Russian companies through...
Aug 12, 20221 min read


APT-C-35: New Windows Framework Revealed
The DoNot Team, an advanced persistent threat actor known as APT-C-35, has released a series of updates to the Windows framework, which...
Aug 12, 20221 min read


Zeppelin Ransomware
The FBI and the Cybersecurity and Infrastructure Security Agency (CISA) are releasing a joint cybersecurity advisory on the threat posed...
Aug 12, 20221 min read


Monster Libra (TA551/Shathak) pushes IcedID (Bokbot) with Dark VNC and Cobalt Strike
Monster Libra is the latest threat actor to push malware into the Windows operating system, and that infection has led to Dark VNC and...
Aug 12, 20221 min read


VileRAT: DeathStalker’s continuous strike at foreign and cryptocurrency exchanges
Kaspersky has identified the VileRAT malware used in a series of attacks against foreign exchange and cryptocurrency trading companies,...
Aug 11, 20221 min read


BlueSky Ransomware: Fast Encryption via Multithreading
BlueSky ransomware is an emerging family of malware that targets Windows hosts and demands a ransom for the decryption of data, according...
Aug 11, 20221 min read


Novel News on Cuba Ransomware aka Greetings From Tropical Scorpius
Beginning in early May 2022, Unit 42 observed a threat actor deploying Cuba Ransomware using novel tools and techniques. Unit 42 tracks...
Aug 10, 20221 min read


Andariel deploys DTrack and Maui ransomware
The Kaspersky security firm has released details of an incident involving the Maui ransomware in 2022, when a North Korean-speaking...
Aug 9, 20221 min read


Meta's Quarterly Adversarial Threat Report
Meta's quarterly report on cyber threats. REFERENCE: https://about.fb.com/wp-content/uploads/2022/08/Quarterly-Adversarial-Threat-Report-...
Aug 9, 20221 min read


Monero CoinMiner Being Distributed via Webhards
The ASEC analysis team has discovered that Monero CoinMiner, also known as XMRig, is being distributed via file-sharing websites such as...
Aug 9, 20221 min read


Linux Malware RapperBot Brute Forcing SSH Servers
RapperBot, an IoT botnet created through brute force, has been used to attack hacked SSH servers, according to researchers at the...
Aug 9, 20221 min read
bottom of page
