Cyber Crime

Arcane Stealer V, a threat for lower-skilled adversaries that scares expertsArcane Stealer V, a threat for lower-skilled adversaries that scares experts

Arcane Stealer V, a threat for lower-skilled adversaries that scares experts

Experts recently analyzed an information-stealing malware tracked as Arcane Stealer V that is very cheap and easy to buy in…

6 years ago
Phishers continue to abuse Adobe and Google Open RedirectsPhishers continue to abuse Adobe and Google Open Redirects

Phishers continue to abuse Adobe and Google Open Redirects

Adobe and Google Open Redirects Abused by Phishing Campaigns Experts reported that phishing campaigns are leveraging Google and Adobe open…

6 years ago
Security Affairs newsletter Round 233Security Affairs newsletter Round 233

Security Affairs newsletter Round 233

A new round of the weekly newsletter arrived! The best news of the week with Security Affairs Hi folk, let…

6 years ago
WhiteShadow downloader leverages Microsoft SQL to retrieve multiple malwareWhiteShadow downloader leverages Microsoft SQL to retrieve multiple malware

WhiteShadow downloader leverages Microsoft SQL to retrieve multiple malware

Researchers at Proofpoint have spotted a piece of downloader, dubbed WhiteShadow, that leverages Microsoft SQL queries to pull and deliver…

6 years ago
Nodersok malware delivery campaign relies on advanced techniquesNodersok malware delivery campaign relies on advanced techniques

Nodersok malware delivery campaign relies on advanced techniques

Microsoft researchers observed a campaign delivering malware, dubbed Nodersok, relying on advanced techniques and elusive network infrastructure. Microsoft experts observed…

6 years ago
German police arrest suspects in raid network hosting Darknet marketplacesGerman police arrest suspects in raid network hosting Darknet marketplaces

German police arrest suspects in raid network hosting Darknet marketplaces

German police have shut down a network hosting Darknet marketplaces focused on the trading of drugs, stolen data and child…

6 years ago
Magecart 5 hacker group targets L7 RoutersMagecart 5 hacker group targets L7 Routers

Magecart 5 hacker group targets L7 Routers

IBM researchers observed one of the Magecart groups using a malicious code to inject into commercial-grade layer 7 L7 routers.…

6 years ago
Study shows connections between 2000 malware samples used by Russian APT groupsStudy shows connections between 2000 malware samples used by Russian APT groups

Study shows connections between 2000 malware samples used by Russian APT groups

A joint research from Intezer and Check Point Research shows connections between nearly 2,000 malware samples developed by Russian APT groups. A…

6 years ago
APT or not APT? What’s Behind the Aggah CampaignAPT or not APT? What’s Behind the Aggah Campaign

APT or not APT? What’s Behind the Aggah Campaign

Researchers at Yoroi-Cybaze ZLab discovered an interesting drop chain associated with the well-known Aggah campaign. Introduction During our threat monitoring…

6 years ago
Campbell County Memorial Hospital in Wyoming hit by ransomware attackCampbell County Memorial Hospital in Wyoming hit by ransomware attack

Campbell County Memorial Hospital in Wyoming hit by ransomware attack

Campbell County Memorial Hospital in Gilette, Wyoming is facing service disruptions after a ransomware attack hit its computer systems on…

6 years ago