article thumbnail

PLAYFULGHOST backdoor supports multiple information stealing features

Security Affairs

The PLAYFULGHOST backdoor shares functionality with Gh0stRAT whose source code was publicly released in 2008. In one case analyzed by the researchers, the attack chain begins by tricking the victim into opening a malicious RAR archive disguised as an image file by using a.jpg extension.

article thumbnail

An archive with 20 Million Taiwanese? citizens leaked in the dark web

Security Affairs

The seller claims the database dates back as 2019, but Cyble researchers noted the last DOB record was from 2008. The post An archive with 20 Million Taiwanese’ citizens leaked in the dark web appeared first on Security Affairs. The database size is 3.5 Copyright (C) 2014 Media.net Advertising FZ-LLC All Rights Reserved -->.

Archiving 363
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Qakbot operations continue to evolve to avoid detection

Security Affairs

Qakbot , also known as QBot, QuackBot and Pinkslipbot, is an info-stealing malware that has been active since 2008. ” The attacks observed by Zscaler employed malicious messages using ZIP archive file having embedded files such as Microsoft Office files, LNK, and Powershell.

article thumbnail

PLAYFULGHOST backdoor supports multiple information stealing features

Security Affairs

The PLAYFULGHOST backdoor shares functionality with Gh0stRAT whose source code was publicly released in 2008. In one case analyzed by the researchers, the attack chain begins by tricking the victim into opening a malicious RAR archive disguised as an image file by using a.jpg extension.

article thumbnail

QakBot threat actors are still operational after the August takedown

Security Affairs

Qakbot , also known as QBot, QuackBot and Pinkslipbot, is an info-stealing malware that has been active since 2008. The messages use Zip archives containing the LNK files and an XLL file (XLL is the extension used for Excel add-ins). The malware spreads via malspam campaigns, it inserts replies in active email threads.

article thumbnail

New QBot campaign delivered hijacking business correspondence

Security Affairs

QBot has been active since 2008, it is used by threat actors for collecting browsing data and banking credentials, and other financial information from the victims. “If the user complies, an archive will be downloaded from a remote server (compromised site), protected with a password given in the original PDF file.”

article thumbnail

A deeper insight into the CloudWizard APT’s activity revealed a long-running activity

Security Affairs

Researchers believe that threat actors use spear phishing as an initial attack vector, the messages include an URL pointing to a ZIP archive hosted on a web server under the control of the attackers. The archive contained two files, a decoy document (i.e. pdf.lnk) used to start the infection and deploy the PowerMagic backdoor.