Beware of Pirated Software Sites That Installs Malware in your Computer

Beware of Pirated Software Sites That Installs Malware in your Computer

As per Raccoon Stealer, it has been found that the malware is being distributed by the website network which acts as a “dropper as a service”. They are serving different types of malware packages...
Kubernetes Clusters Compromised

Over 50,000 Ips Across Multiple Kubernetes Clusters Were Compromised By the TeamTNT Threat Actors

Researchers from Trend Micro disclosed that close to 50,000 IPs were compromised across multiple Kubernetes clusters in a cryptojacking campaign conducted by the TeamTNT group. Kubernetes, developed and backed by Google, is one of the...
RAT Uses Autohotkey

A New Unique RAT Heavily Uses The Autohotkey Scripting Language On An Ongoing Malware...

The Morphisec Labs team has tracked a unique and ongoing RAT delivery campaign that heavily uses the AutoHotKey scripting language, a fork of the AutoIt language that is frequently used for testing purposes. Researchers identified...
Hackers Abuse Microsoft Build Engine

Hackers Abuse Microsoft Build Engine to Deliver Password-Stealing Malware Filelessly

Anomali Threat Research recognized a campaign in which threat actors used Microsoft Build Engine (MSBuild) to filelessly deliver Remcos remote access tool (RAT) and password-stealing malware commonly known as RedLine Stealer. Threat actors used MSBuild,...
TeaBot Malware

TeaBot – A New Malware that stealing victim’s Credentials and Intercepting SMS Messages

A new trendy and massive android banking trojan was discovered and analyzed by Cleafy called TeaBot. This Teabot steals the victim’s credentials and SMS messages for enabling fraud scenarios against a predefined list of...
Security Flaws Russian Hackers

Top 12 Security Flaws Exploited by Russian Hackers to Target Organisations Globally

A joint advisory by the US Department for Homeland Security's Cybersecurity Infrastructure Security Agency (CISA), FBI, and the National Security Agency (NSA), as well as the UK National Cyber Security Centre warned organizations about...
WeSteal Cryptocurrency-Stealing

WeSteal: A Cryptocurrency-Stealing Malware that Sold in Dark Web Markets

A new cryptocurrency stealer called WeSteal is available on the cybercrime underground! its promises advertising as “the leading way to make money in 2021. What is WeSteal? WeSteal is a Python-based malware that uses regular expressions...
ToxicEye RAT

ToxicEye RAT Uses Telegram Communications to Steal Data from Victims and to Perform Malicious...

Researchers at Check Point Software Technologies found that hackers are leveraging the popular Telegram messaging app by embedding its code inside a remote access trojan (RAT) which is also known as ToxicEye. Telegram is the...
Beware of a New Malware Campaign that Hides Malicious code within BMP Image

Beware of a New Malware Campaign that Hides Malicious code within BMP Image

Lazarus APT is one of the most sophisticated North Korean Threat Actors that has been active since at least 2009. This actor is known to target the U.S., South Korea, Japan, and several other countries....
Dridex Network Attack Campaign

Dridex Network Attack Campaign Delivered by Cutwail Botnet and Poisonous PowerShell Scripts

The IBM X-Force threat intelligence team has recently reported that they are continuously witnessing a huge increase in Dridex-related network attacks, and all these attacks are executed by the Cutwail botnet.  According to the cybersecurity...