article thumbnail

BlackWater, a malware that uses Cloudflare Workers for C2 Communication

Security Affairs

Researchers from MalwareHunterTeam discovered a suspicious RAR file named “COVID-19-” that was being distributed online, likely through phishing emails. "Important The RAR archive contains a file named “Important – COVID-19” that displays a Word icon. "Important – COVID-19.rar"

article thumbnail

ToxicEye RAT exploits Telegram communications to steal data from victims

Security Affairs

“The bot is embedded into the ToxicEye RAT configuration file and compiled into an executable file (an example of a file name we found was ‘paypal checker by saint.exe’). The post ToxicEye RAT exploits Telegram communications to steal data from victims appeared first on Security Affairs. Pierluigi Paganini.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Threat actors attempted to capitalize CrowdStrike incident

Security Affairs

The attackers attempted to trick the company’s customers into opening a ZIP archive file named “ crowdstrike-hotfix.zip.” ” The archive includes a loader named Hijack Loader used to execute the Remcos RAT. ” reads the report published by Kaspersky.

article thumbnail

B1txor20 Linux botnet use DNS Tunnel and Log4J exploit

Security Affairs

The malware was first spotted on February 9, 2022, when 360Netlab’s honeypot system captured an unknown ELF file that was spreading by exploiting the Log4J vulnerability. The name B1txor20 is based on the file name “b1t” used for the propagation and the XOR encryption algorithm, and the RC4 algorithm key length of 20 bytes.

Honeypots 362
article thumbnail

A new Linux version of TargetCompany ransomware targets VMware ESXi environments

Security Affairs

The malware then enters “VM mode” to encrypt files with specific extensions. Once executed, the ransomware drops a text file named TargetInfo.txt that contains victim information. Like the Windows variant of the ransomware, the content of the file TargetInfo.txt is then sent to a C2 server.

article thumbnail

Night Sky, a new ransomware operation in the threat landscape

Security Affairs

Once encrypted a file, the ransomware appends the ‘ nightsky ‘ extension to encrypted file names. Experts pointed out that the gang communicates with victims via email and a clear website running an instance of the Rocket.Chat. Source MalwareHunterTeam.

article thumbnail

North Korea-linked Kimsuky APT attack targets victims via Messenger

Security Affairs

However, the fact that mutual communication and reliability were promoted through Facebook Messenger shows that the boldness of Kimsuky APT attacks is increasing day by day.” “And if you compare the two malicious file execution screens, you can see the same pattern. ” reads the report published by GSC.