Campaign  

DATE

NAME

INFO

CATEGORY

SUBCATE

9.5.24 (RMM) tools Spam campaign targeting Brazil abuses Remote Monitoring and Management tools CAMPAIGN PHISHING
9.5.24 FreeDrain FreeDrain Unmasked | Uncovering an Industrial-Scale Crypto Theft Network CAMPAIGN PHISHING

4.5.24

Pahalgam Attack themed

Advisory: Pahalgam Attack themed decoys used by APT36 to target the Indian Government

CAMPAIGN

APT

1.5.24 Hive0117 New Hive0117 phishing campaign imitates conscription summons to deliver DarkWatchman malware CAMPAIGN PHISHING
19.4.25 Smishing Triad Smishing Triad: Chinese eCrime Group Targets 121+ Countries, Intros New Banking Phishing Kit CAMPAIGN SPAM
17.4.25 Sponsored Actors Try ClickFix Around the World in 90 Days: State-Sponsored Actors Try ClickFix CAMPAIGN CAMPAIGN

6.4.25

PoisonSeed Campaign PoisonSeed Campaign Targets CRM and Bulk Email Providers in Supply Chain Spam Operation CAMPAIGN SPAM
3.4.25 Stripe API Skimming Campaign Stripe API Skimming Campaign: Additional Victims and Insights CAMPAIGN Skimming

28.3.25

J-Magic

Juniper Routers, Network Devices Targeted with Custom Backdoors

CAMPAIGN

MALWARE

28.3.25

Gamaredon

Gamaredon campaign abuses LNK files to distribute Remcos backdoor

CAMPAIGN

MALWARE

25.3.25

.NET MAUI New Android Malware Campaigns Evading Detection Using Cross-Platform Framework .NET MAUI CAMPAIGN Malware

20.3.25

ClearFake ClearFake’s New Widespread Variant: Increased Web3 Exploitation for Malware Delivery CAMPAIGN MALWARE
10.3.25 Desert Dexter. Attacks Desert Dexter. Attacks on Middle Eastern countries CAMPAIGN Malware

8.3.25

Phishing Campaign Using Private Video Sharing We’re aware that phishers have been sharing private videos to send false videos, including an AI generated video of YouTube’s CEO Neal Mohan announcing changes in monetization. CAMPAIGN PHISHING

8.3.25

Snail Mail Fail Snail Mail Fail: Fake Ransom Note Campaign Preys on Fear CAMPAIGN Ransom
25.2.25 GitVenom campaign The GitVenom campaign: cryptocurrency theft using GitHub CAMPAIGN CRYPTOCURRENCY
22.2.25 DeceptiveDevelopment Cybercriminals have been known to approach their targets under the guise of company recruiters, enticing them with fake employment offers. CAMPAIGN Malware
18.2.25 RevivalStone The China-linked threat actor known as Winnti has been attributed to a new campaign dubbed RevivalStone that targeted Japanese companies in the manufacturing, materials, and energy sectors in March 2024. CAMPAIGN APT
18.2.25 Earth Freybug’s Stealth in the Shadows: Dissecting Earth Freybug’s Recent Campaign and Operational Techniques CAMPAIGN Malware
15.2.25 DEEP#DRIVE Analyzing DEEP#DRIVE: North Korean Threat Actors Observed Exploiting Trusted Platforms for Targeted Attacks CAMPAIGN APT
15.2.25 BadPilot The BadPilot campaign: Seashell Blizzard subgroup conducts multiyear global access operation CAMPAIGN Operation
10.2.25 Webflow CDN New Phishing Campaign Abuses Webflow, SEO, and Fake CAPTCHAs CAMPAIGN Phishing

18.1.25

GSocket Gambling Scavenger GSocket Gambling Scavenger – How Hackers Use PHP Backdoors and GSocket to Facilitate Illegal Gambling in Indonesia CAMPAIGN CAMPAIGN
16.12.24 DeceptionAds “DeceptionAds” — Fake Captcha Driving Infostealer Infections and a Glimpse to the Dark Side of Internet Advertising CAMPAIGN MALWARETISING
18.12.24 HubPhish Effective Phishing Campaign Targeting European Companies and Organizations CAMPAIGN Phishing
09.12.24 Drops Zbot Black Basta Ransomware Campaign Drops Zbot, DarkGate, and Custom Malware CAMPAIGN RANSOMWARE
05.12.24 Earth Kasha Spear Guess Who’s Back - The Return of ANEL in the Recent Earth Kasha Spear-phishing Campaign in 2024 CAMPAIGN PHISHING
04.12.24 Secret Blizzard Frequent freeloader part I: Secret Blizzard compromising Storm-0156 infrastructure for espionage CAMPAIGN ESPIONAGE

13.11.2024

Dream Job

Iranian “Dream Job” Campaign 11.24

CAMPAIGN

CAMPAIGN

07.11.24

VEILDrive 

Unmasking VEILDrive: Threat Actors Exploit Microsoft Services for C2

CAMPAIGN

EXPLOIT

07.11.24

CopyRh(ight)adamantys

CopyRh(ight)adamantys Campaign: Rhadamantys Exploits Intellectual Property Infringement Baits

CAMPAIGN

EXPLOIT

05.11.24

Typosquat 

Typosquat Campaign Targeting npm Developers

CAMPAIGN

MALWARE

30.10.24

Rampant Phishing You’re Invited: Rampant Phishing Abuses Eventbrite CAMPAIGN PHISHING

28.10.24

Gun Campaign TeamTNT’s Docker Gatling Gun Campaign CAMPAIGN CAMPAIGN

28.10.24

ClickFix ClickFix tactic: The Phantom Meet CAMPAIGN SOCIAL

27.9.24

SilentSelfieSilentSelfie: Uncovering a major watering hole campaign against Kurdish websitesCAMPAIGNCAMPAIGN

26.9.24

SloppyLemmingUnraveling SloppyLemming’s Operations Across South AsiaCAMPAIGNCrypto

26.9.24

Salt TyphoonChina's 'Salt Typhoon' Cooks Up Cyberattacks on US ISPsCAMPAIGNISP

23.9.24

Earth BaxiaEarth Baxia Uses Spear-Phishing and GeoServer Exploit to Target APACCAMPAIGNPHISHING

19.9.24

Vanilla TempestHighway Blobbery: Data Theft using Azure Storage ExplorerCAMPAIGNRansomware

19.9.24

Storm cloudsStorm clouds on the horizon: Resurgence of TeamTNT?CAMPAIGNCAMPAIGN

13.9.24

ProxyjackingFrom Automation to Exploitation: The Growing Misuse of Selenium Grid for Cryptomining and ProxyjackingCAMPAIGNCRYPTOCURRENCY

11.9.24

Crimson PalaceCrimson Palace returns: New Tools, Tactics, and TargetsCAMPAIGNAPT

11.9.24

Earth PretaEarth Preta Evolves its Attacks with New Malware and StrategiesCAMPAIGNAPT

30.8.24

VoldemortThe Malware That Must Not Be Named: Suspected Espionage Campaign Delivers “Voldemort”CAMPAIGNCAMPAIGN

30.8.24

SLOW#TEMPESTFrom Cobalt Strike to Mimikatz: A Deep Dive into the SLOW#TEMPEST Campaign Targeting Chinese UsersCAMPAIGNAPT

16.8.24

TuskTusk: unraveling a complex infostealer campaignCAMPAIGNMalware

15.8.24

River of Phish SPEAR-PHISHING CASES FROM EASTERN EUROPE 2022-2024A TECHNICAL BRIEFCAMPAIGNPhishing

15.8.24

Earth BakuA Dive into Earth Baku’s Latest CampaignCAMPAIGNCAMPAIGN

4.8.24

PanamorfiA New Discord DDoS CampaignCAMPAIGNDDOS

2.8.24

ERIAKOS"ERIAKOS" Scam Campaign: Detected by Recorded Future’s Payment Fraud Intelligence TeamCAMPAIGNScam

2.8.24

DEV#POPPER campaign

The Securonix Threat Research team has been monitoring the threat actors behind the ongoing investigation into the DEV#POPPER campaign, we have identified additional malware variants linked to the same North Korean threat actors using similar, stealthy malicious code execution tactics, though now with much more robust capabilities.

CAMPAIGN

CAMPAIGN

2.8.24

OneDrive Pastejacking

OneDrive Pastejacking: The crafty phishing and downloader campaign

CAMPAIGN

PHISHING

25.7.24

CVE-2024-21412Exploiting CVE-2024-21412: A Stealer Campaign UnleashedCAMPAIGNCVE
20.6.24SustainedSustained Campaign Using Chinese Espionage Tools Targets TelcosCAMPAIGNCAMPAIGN
18.6.24Spinning YARNSpinning YARN - A New Linux Malware Campaign Targets Docker, Apache Hadoop, Redis and ConfluenceCAMPAIGNMalware

18.5.24

Earth Hundun'sTracking the Progression of Earth Hundun's Cyberespionage Campaign in 2024CampaignCyberSpy

10.5.24

APT28 APT28 campaign targeting Polish government institutions CampaignAPT
30.4.24DEV#POPPERANALYSIS OF DEV#POPPER: NEW ATTACK CAMPAIGN TARGETING SOFTWARE DEVELOPERS LIKELY ASSOCIATED WITH NORTH KOREAN THREAT ACTORSCampaignCampaign
25.4.24 ArcaneDoor ArcaneDoor - New espionage-focused campaign found targeting perimeter network devices Campaign Spy
25.4.24 FROZEN#SHADOW Attack Analysis of Ongoing FROZEN#SHADOW Attack Campaign Leveraging SSLoad Malware and RMM Software for Domain Takeover Campaign Campaign
19.4.24 BlackTech  Cyberespionage Group Earth Hundun's Continuous Refinement of Waterbear and DeuterbearCampaignCyberespionage
19.4.24 DuneQuixote DuneQuixote campaign targets Middle Eastern entities with “CR4T” malwareCampaignCampaign
17.4.24 Connect:fun In a new threat briefing, Forescout Research – Vedere Labs details an exploitation campaign targeting organizations running Fortinet’s FortiClient EMS which is vulnerable to CVE-2023-48788. We are designating this campaign Connect:fun because of the use of ScreenConnect and Powerfun as post-exploitation tools – our first-ever named campaign. CampaignCampaign
16.4.24 SteganoAmor SteganoAmor campaign: TA558 mass-attacking companies and public institutions all around the worldCampaignCampaign
12.4.24 DarkBeatC2 DarkBeatC2: The Latest MuddyWater Attack FrameworkCampaignAPT

11.4.24

eXotic Visit

ESET researchers uncovered the eXotic Visit espionage campaign that targets users mainly in India and Pakistan with seemingly innocuous apps

Campaign

Android

11.4.24

Raspberry Robin

Raspberry Robin Now Spreading Through Windows Script Files

Campaign

Virus

28.3.24 ShadowRay ShadowRay: First Known Attack Campaign Targeting AI Workloads Actively Exploited In The Wild Campaign AI
27.3.24 RedAlpha Recorded Future’s Insikt Group has identified two new cyberespionage campaigns targeting the Tibetan Community over the past two years. The campaigns, which we are collectively naming RedAlpha, combine light reconnaissance, selective targeting, and diverse malicious tooling. Campaign Campaign
12.3.24Copybara Fraud OperationOn top of this fraud operation architecture, TAs exploit Social Engineering techniques for distributing the Copybara banking trojan, which typically involves smishing and vishing techniques, leveraging native-speaker operators. In particular, several samples reveal TAs distributing Copybara through seemingly legitimate apps, utilizing logos of well-known banks and names that sound authentic, such as “Caixa Sign Nueva”, “BBVA Codigo”, “Sabadell Codigo”. CampaignOperation
7.3.24Spinning YARNSpinning YARN - A New Linux Malware Campaign Targets Docker, Apache Hadoop, Redis and ConfluenceCampaignCampaign
21.2.24SMUGX CHINESE THREAT ACTORS TARGETING EUROPE IN SMUGX CAMPAIGNCampaignCampaign
21.2.24Earth PretaEarth Preta Campaign Uses DOPLUGS to Target AsiaCampaignCampaign

2.2.24

Commando Cat The Nine Lives of Commando Cat: Analysing a Novel Malware Campaign Targeting Docker CampaignCryptocurrency

18.1.24

Mind Sandstorm New TTPs observed in Mint Sandstorm campaign targeting high-profile individuals at universities and research orgs CampaignCampaign

10.1.24

DB#JAMMER

Securonix Threat Labs Security Advisory: Threat Actors Target MSSQL Servers in DB#JAMMER to Deliver FreeWorld Ransomware

Campaign

Campaign

24.12.23

Nim-based

A Look at the Nim-based Campaign Using Microsoft Word Docs to Impersonate the Nepali Government

Campaign

Campaign