article thumbnail

China-linked APT Mustang Panda upgrades tools in its arsenal

Security Affairs

All the variants are distributed within archives containing a legitimate executable and a malicious DLL: Variant 1: Archive cf.rar includes mrender.exe and libcef.dll. Variant 2: Archive ru.zip includes FastVD.exe and LogMeIn.dll. Variant 3: Archive zz.rar includes gpgconf.exe and libgcrypt-20.dll.

IT 172
article thumbnail

BlackWater, a malware that uses Cloudflare Workers for C2 Communication

Security Affairs

The RAR archive contains a file named “Important – COVID-19” that displays a Word icon. The post BlackWater, a malware that uses Cloudflare Workers for C2 Communication appeared first on Security Affairs. . "Important – COVID-19.rar" rar" -> "Important – COVID-19.docx.exe"

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

IT Army of Ukraine gained access to a 1.5GB archive from Gazprom

Security Affairs

GB archive. GB archive belonging to the Russian energy giant Gazprom. The group of hacktivists announced the hack on their Telegram channel claiming that the archive contains more than 6,000 files of the companies of the Gazprom group. “The archive with a capacity of 1.5 “The archive with a capacity of 1.5

Archiving 246
article thumbnail

Threat actors attempted to capitalize CrowdStrike incident

Security Affairs

The attackers attempted to trick the company’s customers into opening a ZIP archive file named “ crowdstrike-hotfix.zip.” ” The archive includes a loader named Hijack Loader used to execute the Remcos RAT. The ZIP archive contains a HijackLoader payload that, when executed, loads RemCos.

article thumbnail

North Korea-linked APT spreads tainted versions of PuTTY via WhatsApp

Security Affairs

Subsequently, UNC4034 communicated with them over WhatsApp and after the communication is established with the victim over WhatsApp, then threat actors tricked victims into downloading a malicious ISO image masqueraded as a fake job. The attack chain starts with a fake job opportunity at Amazon sent to the victims via email.

Archiving 335
article thumbnail

Russia-linked APT29 group exploited WinRAR 0day in attacks against embassies

Security Affairs

The Russia-linked APT group was observed using a specially crafted ZIP archive that runs a script in the background to show a PDF lure while downloading PowerShell code to fetch and execute a payload. ” In this attack scheme, Ngrok has been used to host their next-stage PowerShell payloads and establish covert communication channels.

Sales 325
article thumbnail

Elevate policyholder and claims experience with OpenText Communications

OpenText Information Management

3 The Boston Consulting Group predicts that over the next five years, $2 trillion in revenue will shift to companies that know how to create personalized experiences and personalized communications. 5 Soar to new heights with the power of GenAI GenAI can assist insurance communications teams in enhancing policyholder communications.