ALERTS 2014 DECEMBER  HOME  AI  APT  BOTNET  CAMPAIGN  CRIME  CRYPTOCURRENCY  EXPLOIT  HACKING  GROUP  OPERATION  PHISHING  RANSOM  SPAM  VIRUS  VULNEREBILITY


2024 March(16) April(92) May(99) June(94) July(88) August(112) SEPTEMBER(67) October(13) November(80) December(6)  2025 January(36) February(50) March(51)


DATE

NAME

CATEGORY

SUBCATE

INFO

31.12.24

SpyMax Targets Uzbek Mobile Users Through Fake Uzum Apps ALERTS VIRUS In 2024, a malicious actor exploited Uzum's brand in a series of campaigns targeting mobile users in Uzbekistan. These campaigns utilized SpyMax, a well-known remote access trojan disguised as a fake Uzum Bank Android application, to compromise victims’ devices and steal sensitive data.

30.12.24

Ficora and Capsaicin botnets leverage old vulnerabilities for distribution ALERTS BOTNET According to the researchers from Fortinet, two Linux botnet variants Ficora and Capsaicin have been distributed in recently observed campaigns. The botnets leverage several old D-Link vulnerabilities affecting the HNAP (Home Network Administration Protocol) interface including CVE-2015-2051, CVE-2019-10891, CVE-2022-37056, and CVE-2024-33112.

28.12.24

Skuld Infostealer malware continues to target developers via npm registry ALERTS VIRUS A malware campaign deploying the Skuld infostealer via the npm registry has been reported, targeting developers with ambiguous packages.

28.12.24

Gosar - a new Golang-based variant of Quasar backdoor ALERTS VIRUS Gosar is a recently identified Golang-based variant of the Quasar backdoor. The malware is spread in campaigns leveraging .MSI installer files disguised as legitimate software packages (such as Telegram or Opera).

28.12.24

Latest XWorm distribution campaign targets the hospitality sector ALERTS VIRUS A new campaign distributing the XWorm commodity malware has been reported in the wild. The attack targets the hospitality sector in the UK.

28.12.24

Recent I2PRAT malware variant leverages anonymous peer-to-peer network communication ALERTS VIRUS The latest I2PRAT malware variant has been observed to leverage I2P anonymous peer-to-peer network for the purpose of C2 communication.