China-linked Phantom Taurus targets govts across Asia, Africa and the Middle East
The group blends custom tooling with shared operational infrastructure.
The group blends custom tooling with shared operational infrastructure.
The campaign, active since at least February 2022, leverages a vulnerability tracked as CVE-2023-43261.
Experts note some shift in attackers’ behavior such as an adoption of the “Steal & Go” tactic.
The threat actors distributed the XLL payloads inside ZIP archives shared via the Signal messaging app.
Zhimin Qian was behind a vast fraudulent Bitcoin investment scheme that defrauded over 128,000 victims in China.
Administrators are advised to apply the available updates and follow vendor guidance to mitigate the risk.
The company has not been able to resume manufacturing and said it could not yet predict when operations will be restored.
The hacker gained access to FEMA’s Region 6 network via Citrix virtual desktop infrastructure using compromised login credentials.
The malicious version introduced a subtle change that quietly BCC’d all outgoing emails to an email address, potentially leaking sensitive content.
The emails contain malicious Scalable Vector Graphics (SVG) files, which serve as the initial trigger for the infection chain.
Showing elements 371 - 380