Phishing Attacks

CRON#TRAP Campaign Attacking Windows Machine With Weaponized Linux VMs

Weaponized Linux virtual machines are used for offensive cybersecurity purposes like "penetration testing" or "exploiting vulnerabilities." These setups often use…

6 months ago

Mamba Toolkit Abuses 2FA In Sophisticated Phishing Attack

Phishing attacks are stealthy cyber threats where threat actors impersonate reputable entities to trick individuals into revealing sensitive information ("passwords"…

6 months ago

Hackers Abusing Legitimate File Hosting Services For Sophisticated Phishing Attack

Stealing personal data information ('name', 'Social Security number', 'credit card details', etc.) for fraudulent activities is dubbed "identity theft."  While…

7 months ago

UNC2970 Hackers Targeting Job Seekers with Weaponized PDF Files

Trojanized PDF readers are malicious software that are disguised as legitimate PDF viewing applications.  They are primarily used by the…

7 months ago

New Copybara Android Malware Remotely Controlling Infected Device

A new variant of Copybara, an Android malware family, has been detected to be active since November 2023 spreading through…

8 months ago

New Phishing Campaign Attacking AWS Accounts To Steal Logins

A phishing email containing only a PNG image was sent from a compromised AWS account using the spoofed sender address…

8 months ago

macOS Malware Disguise As Unarchiver App Steals User Data

Since unarchiver apps are commonly used and trusted for extracting files, threat actors often abuse them to disseminate malware and…

9 months ago

iPhone Users Beware! Fake Postal Messages Stealing Your Login Credentials

Cybercriminals have launched a smishing campaign targeting iPhone users in India, impersonating India Post. Malicious iMessages falsely claim a package…

9 months ago

Beware Of Malicious PDF Files That Mimic Microsoft 2FA Security Update

Malware authors are exploiting the growing popularity of QR codes to target users through PDF files, where these malicious PDFs,…

10 months ago

New OPIX Ransomware Encrypting Files With Random Character String

A recently identified ransomware variant dubbed OPIX encrypts user files using a random character string and adds the ".OPIX" extension…

10 months ago