Cybersecurity Week in Review: June 7, 2024
In brief: A corruption scheme to bypass Interpol Red Notices exposed, Russia escalates disinformation campaigns, and more.
In brief: A corruption scheme to bypass Interpol Red Notices exposed, Russia escalates disinformation campaigns, and more.
The campaign leveraged previously unreported malware, as well as an updated variant of Eagerbee.
In some cases, the threat actor deployed a cryptominer on systems equipped with powerful NVIDIA RTX graphics cards.
The disruption was a result of a ransomware attack on Synnovis, a third-party provider of essential pathology services.
The malware, delivered through DMs, does not require any user actions beyond simply opening a message.
The malware is being distributed via Signal messaging service.
The suspects are accused of being key players in the distribution and administration of malware loaders.
The attack chain involves the use of a MS Excel file with a VBA macro to initiate the infection process.
The Russian influence actors Storm-1679 and Storm-1099 have shifted their focus to the Olympics since June 2023.
The list of the most deployed, attributed malware families includes RATs, stealers, and ransomware.
Showing elements 1251 - 1260