EARLYCROW – Detecting APT Malware Command and Control Over HTTPS
Advanced Persistent Threats (APTs) represent a significant challenge for cybersecurity, targeting critical organizations with stealth and precision.
Traditional Network Intrusion Detection Systems (NIDS) often fail to detect these threats due to their sophisticated tactics.
To address...
Researchers Compared Malware Development in Rust vs C & C++ Languages
In recent years, malware authors have increasingly turned to emerging programming languages like Rust, Nim, and Go for their nefarious creations.
This shift represents a tactical evolution as threat actors seek to bypass modern security...
BadPilot Attacking Network Devices To Expand Russian Seashell Blizzard’s Attacks
Microsoft Threat Intelligence has exposed a subgroup within the Russian state actor Seashell Blizzard, known as the "BadPilot campaign."
This subgroup has been conducting a multiyear operation to compromise Internet-facing infrastructure globally, expanding Seashell Blizzard's...
Jaguar Land Rover Allegedly Hacked – Threat Actor Leaked 700 Internal Documents
A threat actor operating under the alias “Rey” has allegedly compromised the internal systems of Jaguar Land Rover (JLR), one of the United Kingdom’s most prominent automotive manufacturers, and leaked approximately 700 internal documents...
New Web Inject Attack Campaigns Targeting MacOS Users To Deploy FrigidStealer Malware
Security researchers at Proofpoint have uncovered a sophisticated web inject campaign targeting MacOS users with a new information-stealing malware called FrigidStealer.
The operation involves two newly identified threat actors, TA2726 and TA2727, collaborating to compromise...
FleshStealer, A New Infostealer Attacking Chrome & Mozilla Users
A new strain of information-stealing malware, dubbed FleshStealer, has emerged as a significant threat to internet users worldwide.
This advanced infostealer targets Chromium and Mozilla-based web browsers, exploiting their vulnerabilities to steal sensitive data, including...
ElizaRAT Leveraging Google, Telegram, and Slack Services For C2 Communication
A sophisticated Windows Remote Access Trojan (RAT) called ElizaRAT has been developed by the APT36 (also known as Transparent Tribe) which has been evolving since its discovery in 2023.
This Pakistani threat actor group, known...
North Korean IT Workers Mimic as US Organizations for Job Offers
North Korea has established a global network of highly skilled IT workers who pose as professionals from other countries to secure remote jobs and freelance contracts with businesses worldwide.
These workers, operating both individually and...
Meta Taken Down 2 Million Account Linked To Cyber Crime Activities
Meta has announced the removal of over 2 million accounts linked to cybercrime activities, particularly focusing on schemes like 'pig butchering.'
This initiative is part of Meta's broader strategy to combat cross-border criminal organizations exploiting...
Researchers Uncover the Bond Between the Infamous Remcos RAT and GuLoader
There have been two instances of software distributors that have disguised themselves as having legitimate purposes but were actually operating with malicious intent.
Threat actors adopting the use of two software, GuLoader (also known as...