Threat actors create Frankenstein campaign using unrelated free tools
The researchers believe that the operators the Frankenstein campaign are moderately sophisticated and highly resourceful.
The researchers believe that the operators the Frankenstein campaign are moderately sophisticated and highly resourceful.
While the tools leaked in April had been seen in previous OilRig’s campaigns, the Jason is completely new to cybersecurity researchers.
The creators of one of the most dominant ransomware claim that they made enough money and now plan to retire.
Researchers at ESET detected a new wave of attacks aimed at diplomatic entities in Eastern Europe using PowerShell scripts to load a wide range of custom malware.
Researchers uncovered a sophisticated campaign, which uses advanced techniques to install malicious payloads on compromised servers.
Both new loaders implement DLL Side-Loading.
At least one hacking group is actively scanning the internet for Windows servers that are running MySQL databases.
This marks the first time when all of them have been used in a single campaign together.
Malware operators run commands manually to collect a vast amount of data from infected systems.
The attacks have been linked to a cyber espionage group APT28.
Showing elements 3961 - 3970