BlackTech cyberespionage group abused ASUS WebStorage to deliver Plead backdoor
The threat actor is highly skilled and primarily focused on cyberespionage in Asia.
The threat actor is highly skilled and primarily focused on cyberespionage in Asia.
The malware uses Windows Bluetooth APIs to find information on connected Bluetooth devices.
The cyber gang launched spear-phishing campaigns throughout 2018 utilising GRIFFON malware to target approximately 130 companies.
LightNeuron backdoor abuses a legitimate feature of the Exchange server in order to hide out and access all of the target organization's messages.
Buckeye used the tools in attacks that targeted telecommunications companies, firms dedicated to scientific research and education institutions from March 2016 to the middle of 2017.
The cybergang behind Retefe trojan has renewed the attacks in April of 2019 concentrating its efforts on Swiss and German online banking customers.
This is the first time malware has been seen using infected routers and IoT devices as a proxy system.
Multiple CVE-2019-3396 exploits are already available publicly.
Cybercriminals are actively scanning for WebLogic servers and using a benign exploit to test the vulnerability.
Hackers have adopted a new tactic that selectively chooses which targets to infect with malware.
Showing elements 3971 - 3980