Cyber Crime

NetDooka framework distributed via a pay-per-install (PPI) malware serviceNetDooka framework distributed via a pay-per-install (PPI) malware service

NetDooka framework distributed via a pay-per-install (PPI) malware service

Researchers discovered a sophisticated malware framework, dubbed NetDooka, distributed via a pay-per-install (PPI) malware service known as PrivateLoader. Trend Micro…

3 years ago
Vulnerable Docker Installations Are A Playhouse for Malware AttacksVulnerable Docker Installations Are A Playhouse for Malware Attacks

Vulnerable Docker Installations Are A Playhouse for Malware Attacks

Uptycs researchers identified ongoing malicious campaigns through our Docker honeypot targeting exposed Docker API. The Uptycs Threat Research team has…

3 years ago
An expert shows how to stop popular ransomware samples via DLL hijackingAn expert shows how to stop popular ransomware samples via DLL hijacking

An expert shows how to stop popular ransomware samples via DLL hijacking

A security researcher discovered that samples of Conti, REvil, LockBit ransomware were vulnerable to DLL hijacking. The security researcher John…

3 years ago
The mystery behind the samples of the new REvil ransomware operationThe mystery behind the samples of the new REvil ransomware operation

The mystery behind the samples of the new REvil ransomware operation

The REvil ransomware gang has resumed its operations, experts found a new encryptor and a new attack infrastructure. The REvil ransomware…

3 years ago
Hackers stole +80M from DeFi platforms Rari Capital and Fei ProtocolHackers stole +80M from DeFi platforms Rari Capital and Fei Protocol

Hackers stole +80M from DeFi platforms Rari Capital and Fei Protocol

Threat actors exploited a bug in the Fuse protocol used by DeFi platforms Rari Capital and Fei Protocol and stole…

3 years ago
Emotet tests new attack chain in low volume campaignsEmotet tests new attack chain in low volume campaigns

Emotet tests new attack chain in low volume campaigns

Emotet operators are testing new attack techniques in response to Microsoft's move to disable Visual Basic for Applications (VBA) macros…

3 years ago
Bumblebee, a new malware loader used by multiple crimeware threat actorsBumblebee, a new malware loader used by multiple crimeware threat actors

Bumblebee, a new malware loader used by multiple crimeware threat actors

Threat actors have replaced the BazaLoader and IcedID malware with a new loader called Bumblebee in their campaigns. Cybercriminal groups…

3 years ago
Conti ransomware operations surge despite the recent leakConti ransomware operations surge despite the recent leak

Conti ransomware operations surge despite the recent leak

Conti ransomware gang continues to target organizations worldwide despite the massive data leak has shed light on its operations. Researchers…

3 years ago
Stormous ransomware gang claims to have hacked Coca-ColaStormous ransomware gang claims to have hacked Coca-Cola

Stormous ransomware gang claims to have hacked Coca-Cola

The Stormous ransomware gang claims to have hacked the multinational beverage corporation Coca-Cola Company. The Stormous ransomware gang announced with a post…

3 years ago
North Korea-linked APT37 targets journalists with GOLDBACKDOORNorth Korea-linked APT37 targets journalists with GOLDBACKDOOR

North Korea-linked APT37 targets journalists with GOLDBACKDOOR

North Korea-linked APT37 group is targeting journalists that focus on DPRK with a new piece of malware. North Korea-linked APT37…

3 years ago