This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Google researchers analyzed a new malware family called PLAYFULGHOST that supports multiple features, including keylogging, screen and audio capture, remote shell, and file transfer/execution. The backdoor is distributed through: Phishing emails with themes such as code of conduct to trick users into downloading the malware.
CERT-UA warned that Russia-linked actor is impersonating the Security Service of Ukraine (SSU) in a new phishing campaign to distribute malware. The Computer Emergency Response Team of Ukraine (CERT-UA) has warned of a new phishing campaign targeting organizations in the country, including government entities.
Researchers detected a sophisticated phishing campaign targeting Microsoft OneDrive users to trick them into executing a PowerShell script. Over the past few weeks, the Trellix Advanced Research Center observed a sophisticated phishing campaign targeting Microsoft OneDrive users. ” reads the report published by Trellix.
Gen Digital observed phishing campaigns distributing the Glove Stealer. The campaign observed by researchers used a phishing message with an HTML file attachment. Threat actors relies on social engineering tactics like ClickFix and FakeCaptcha to trick users into executing malicious scripts via PowerShell or Run prompts.
Most Bumblebee infections started by users executing LNK files which use a system binary to load the malware. The malware is distributed through phishing messages using a malicious attachment or a link to the malicious archive containing Bumblebee. “the new Bumblebee payload is delivered via MSI files.
In late November, the experts spotted a malspam campaign impersonating DHL which used emails about freight invoices, attaching zip filesnamed “Invoice###.zip” The zip archive contains an obfuscated JavaScript file, which creates and executes a PowerShell script that connects to the C2 (62.133.60[.]137),
Group-IB uncovered a new sophisticated phishing campaign, tracked as PerSwaysion, against high-level executives of more than 150 companies worldwide. . PerSwaysion is a highly-targeted phishing campaign. New round of phishing attempts leveraging current victim’s account usually takes less than 24 hours.
Experts that want to to study phishing attack schema and Kit-composition can use the recently PhishingKitTracker, which is updated automatically. If you are a security researcher or even a passionate about how attackers implement phishing you will find yourself to look for phishing kits. Disclaimer.
Ukraine CERT-UA spotted a spear-phishing campaign conducted by Russia-linked Armageddon APT targeting local state organizations. The phishing messages have been sent from “vadim_melnik88@i[.]ua,” The messages use the HTML-file “War criminals of the Russian Federation.htm” as attachment.
On July 24, 2024, CrowdStrike experts identified a spear-phishing campaign targeting German customers by exploiting the recent issue with Falcon Sensor updates. ” The spear-phishing page includes the brands of the targeted company and CrowdStrike. “The website it[.]com min.js” to evade detection.
The attack chain starts with the theft of the identity of a real person in South Korea, then the victims were contacted via Facebook Messenger. Threat actors pretended to share private documents they had written with the victims. “The initial individual approach is similar to an email-based spear phishing attack strategy.
The threat actor used spear-phishing emails and exploited the recently patched GeoServer vulnerability CVE-2024-36401. is a Remote Code Execution (RCE) issue caused by unsafe evaluation of property names as XPath expressions. GeoServer is an open-source server that allows users to share and edit geospatial data.
PaloAlto Networks experts warn of malicious Coronavirus themed phishing campaigns targeting government and medical organizations. The attacks against the Canadian healthcare organizations were discovered between March 24 and March 26, they started with coronavirus -themed phishing campaigns that were carried out in the last months.
On October 21, 2022, the Ukraine CERT-UA uncovered a phishing campaign impersonating the Press Service of the General Staff of the Armed Forces of Ukraine. The phishing messages included a link to a third-party website for downloading a document titled ‘?????_309.pdf’
Researchers from MalwareHunterTeam discovered a suspicious RAR filenamed “COVID-19-” that was being distributed online, likely through phishing emails. "Important The RAR archive contains a filenamed “Important – COVID-19” that displays a Word icon.
Once an attacker obtained Microsoft 365 credentials, for example from a previous phishing campaign or data breach, that can access Teams and other Office applications. “Compounding this problem is the fact that default Teams protections are lacking, as scanning for malicious links and files is limited.
Experts spotted a new malware dubbed QNodeService that was involved in Coronavirus-themed phishing campaign, crooks promise victims COVID-19 tax relief. Researchers uncovered a new malware dubbed QNodeService that was employed in a Coronavirus-themed phishing campaign.
GooseEgg is usually deployed with a batch script, commonly named execute.bat or doit.bat. This script creates a filenamed servtask.bat, which includes commands for saving or compressing registry hives. Most of the APT28s’ campaigns leveraged spear-phishing and malware-based attacks.
The attackers carried out both phishing campaigns and DDoS attacks. This activity ranges from espionage to phishing campaigns.” ” FancyBear has conducted several large credential phishing campaigns aimed at the users of Ukrainian media company UkrNet. ” wrote Shane Huntley, Google’s TAG lead.
Google researchers analyzed a new malware family called PLAYFULGHOST that supports multiple features, including keylogging, screen and audio capture, remote shell, and file transfer/execution. The backdoor is distributed through: Phishing emails with themes such as code of conduct to trick users into downloading the malware.
Hacked websites were used for several malicious purposes, experts observed compromised WordPress and Joomla websites serving Shade /Troldesh ransomware, coin miners, backdoors, and some times were involved in phishing campaigns. The attackers use these locations to hide malware and phishing pages from the administrators.
In August 2023 ThreatFabric discovered new samples distributed via phishing webpages designed to trick recipients into installing malicious APKs. “ThreatFabric was able to identify active campaigns distributing the malware via phishing pages. The list of targets is larger than previous versions.
Iran-linked Cobalt Dickens APT group carried out a spear-phishing campaign aimed at tens of universities worldwide. This operation is similar to the threat group’s August 2018 campaign , using compromised university resources to send library-themed phishing emails.” ” reads the analysis published by Secureworks.
A suspected ScreenConnect setup MSI appeared to have been delivered in a zipped filenamed “Special discount program.zip”, suggesting that it arrived in a spear-phishing email.” The malicious archive was likely spread through spear-phishing messages. Evidence of a possible vector was found at only one target.
Attackers carried out spear-phishing emails using the Know Your Customer regulations (KYC) as a lure. The new infection chain starts by including just one LNK file in the ZIP archive attached to spear-phishing messages. The PyVil RAT was recently employed in attacks against FinTech companies across the U.K.
During our Threat Intelligence activities we noticed a suspicions artifact named “ CoronaVirusSafetyMeasures_pdf ”, so, intrigued by its name and by its recent submission on Yomi Hunter ( LINK ), we decided to deep dive into it. Probably, the infection vector was a phishing mail containing a specific attachment. exe” appeared.
Ukraine CERT-UA uncovered a spear-phishing campaign conducted by Belarus-linked GhostWriter APT group targeting Ukrainian state entities with Cobalt Strike Beacon. The phishing messages use a RAR-archive named “Saboteurs.rar”, which contains RAR-archive “Saboteurs 21.03.rar.”
The phishing messages included a link to a malicious HTML file ( EnvyScout ) that acted as a dropper for additional malicious payloads, including a Cobalt Strike beacon. “Many of these documents appear to be phishing documents associated with common cybercrime techniques. The payload file is an ISO filenamed Agenda.iso.
Once obtained the credentials, the attackers launched voice phishing attacks in an attempt to trick the victim into accepting the MFA push notification started by the attacker. The content of these files match what we already identified and disclosed.” ” reads an update published by Cisco on September September 11, 2022.
Mandiant researchers in early 2022 responded to an incident where the Russia-linked APT29 group (aka SVR group , Cozy Bear , Nobelium , and The Dukes ) successfully phished a European diplomatic entity. Then the attacker can write an arbitrary number of bytes to any file on the file system, posing as the victim account.
The Russia-linked APT group delivers Cannon in a spear-phishing attack that targets government organizations in North America, Europe and in a former USSR state. Hackers used weaponized filesnamed ‘crash list (Lion Air Boeing 737).docx’ docx’ for their campaigns.
Experts observed a new phishing campaign that used a specially crafted ZIP archive that was designed to bypass secure email gateways to distribute malware. Attackers have devised a new technique to distribute malware bypassing secure email gateways and other security solutions by using a specially crafted ZIP file.
The threat actor uses phishing messages with weaponized Microsoft Office documents to deliver the RAT. The maldocs used in this campaign have benign filenames such as “Company-Terms.doc”, “DOT_JD_GM.doc.” ” The most recent campaign started in January 2020 and is still ongoing.
Threat actors behind ToxicEye spread the RAT via phishing emails containing a malicious.exe file. “The bot is embedded into the ToxicEye RAT configuration file and compiled into an executable file (an example of a filename we found was ‘paypal checker by saint.exe’).
“In late June 2019, FireEye identified a phishing campaign conducted by APT34, an Iranian-nexus threat actor.” The phishing campaign primarily targeted organizations in the energy and oil and gas, along with government entities. The fake profiles asked the victims to open the weaponized excel filenamed ERFT-Details.
Attackers could use this for malicious purposes such as phishing, as the document will show the embedded online video with a link to YouTube, while disguising a hidden html /javascript code that will be running in the background and could potentially lead to further code execution scenarios.”
By getting their hands on Microsoft Vancouver’s WordPress login, phishers could use the original Microsoft domain to carry out massive phishing campaigns that would bypass phishing filters. Such phishing messages would be displayed as legitimate emails coming from Microsoft.
Google recently announced to have blocked a phishing campaign originating conducted by China-linked cybereaspionage group APT31 (aka Zirconium , Judgment Panda, and Red Keres) and aimed at Gmail users associated with the U.S. government.
The attack chain starts with spear-phishing messages with a.RAR attachment named “12-1-125_09.01.2023.” The.RAR archive contains the.LNK filenamed “Запит Служба безпеки України 12-1-125 від 09.01.2023.lnk” GammaSteel is a PowerShell script used to conduct reconnaissance and execute additional commands.
Welcome to August’s review of phishing scams, in which we look at criminals’ latest tactics and provide examples of successful frauds. Microsoft issues alert about “crafty” phishing scams. Security researchers at Microsoft are again warning users about phishing scams imitating SharePoint.
Researchers at ZLab spotted a new phishing campaign using Covid19 lures to spread Himera and Absent-Loader. . Thus, once clicked, it allows this malicious document to execute a malicious filenamed HimeraLoader.exe. Introduction. The following picture reports the infection chain used in this campaign: Figure 2: Infection Chain.
Filesnames and paths observed in numerous campaigns conducted by the operator revealed a link to the scat01 and SoftEgorka nicknames, the vitasa01 [ @ ] yandex. According to the experts, the same individual was responsible for phishing attacks and scam attempts on his forum mates.” ru website. .”
The phishing messages include links pointing to Slack or BaseCamp cloud storage, for this reason, they don’t raise suspicion when are received by employees working at an organization that uses the above services. Some of the files’ names observed by the experts are presentation-document.exe, preview-document-[number].exe
” Gallmaker uses spear phishing messages using a weaponized Office document that uses the Dynamic Update Exchange (DDE) protocol to execute commands in the memory of the targeted device. Rather, the attack activity we observed is carried out exclusively using LotL tactics and publicly available hack tools.”
We organize all of the trending information in your field so you don't have to. Join 55,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content