Cybercriminals deliver Quasar RAT via advanced phishing campaign
The attackers use several tricks to avoid detection leveraging methods such as password protection and encoded macros.
The attackers use several tricks to avoid detection leveraging methods such as password protection and encoded macros.
The command and control server and IP address used in the new phishing campaign were previously observed in the Kimsuky campaign ties to North Korea.
The use of Tor network helps the malware operators to conceal its command and control servers and to avoid detection.
After infecting an Android mobile device, Filecoder scans the victim's contact list and sends links on ransomware to all the entries in the list.
URGENT/11 vulnerabilities pose a serious risk as they allow attackers to take over devices with no user interaction required.
The attackers inject multi-gateway skimmer in fake Google domains in order to steal payment data.
WatchBog is beginning to explore financial opportunities on a different platform.
Previously Intrusion Truth exposed several hackers involved in cyber operations carried out by APT10 and APT3 groups.
The new tool shares similarities with PowerSniff, but also contains a number of new capabilities.
APT34 updated its toolset with three new malware families tracked as TONEDEAF, VALUEVAULT, and LONGWATCH.
Showing elements 3921 - 3930