ALERTS 2014 NOVEMBER HOME AI APT BOTNET CAMPAIGN CRIME CRYPTOCURRENCY EXPLOIT HACKING GROUP OPERATION PHISHING RANSOM SPAM VIRUS VULNEREBILITY
2024 March(16) April(92) May(99) June(94) July(88) August(112) SEPTEMBER(67) October(13) November(80) December(6) 2025 January(36) February(50) March(51)
DATE |
NAME |
CATEGORY |
SUBCATE |
INFO |
27.10.24 | Multiple vulnerabilities affecting Palo Alto Networks Expedition | ALERTS | VULNEREBILITY | Multiple vulnerabilities affecting Palo Alto Networks Expedition have been disclosed this month. The reported flaws (CVE-2024-9463, CVE-2024-9464, CVE-2024-9465, CVE-2024-9466, CVE-2024-9467) have been rated between CVSS 7.0 and CVSS 9.9 and include a mix of command injection, cross-site scripting (XSS), cleartext storage of sensitive information, missing authentication, and SQL injection vulnerabilities. If exploited they could allow the attackers to read database contents in addition to writing arbitrary files to temporary storage locations on the vulnerable system, among others. The vulnerabilities have already been addressed by the product vendor in the application version 1.2.96 or later. |
27.10.24 | CVE-2024-47575 - Fortinet FortiManager Missing Authentication vulnerability | ALERTS | VULNEREBILITY | CVE-2024-47575 is a Zero-day vulnerability affecting Fortinet FortiManager, that has been disclosed just this month. The vulnerability has been rated with a critical CVSS score of 9.8. If successfully exploited, it could allow remote unauthenticated attackers to execute arbitrary code via specially crafted requests. The flaw has been reported as being exploited in the wild attacks since at least June 2024. Following those reports, it has also been added to the CISA's Known Exploited Vulnerabilities (KEV) catalog just this week. |
27.10.24 | Parano Stealer | ALERTS | VIRUS | Parano Stealer is another "run-of-the-mill" infostealer variant recently observed in the wild. This Python-based malware has functionality to collect and exfiltrate various information from the compromised endpoints, including: credentials, cookies, miscellaneous data stored in web browsers, cryptocurrency wallets, system information or data from various 3rd party applications like Steam, Telegram or Discord. |
27.10.24 | Liberium RAT malware | ALERTS | VIRUS | Liberium RAT (also known as ShadowRoot) is a malware variant recently advertised for sale on hacking forums. The malware has the capabilities allowing the attackers remote access to the vulnerable endpoints, file management operations, registry manipulation as well as theft of system related information and other confidential data. |
27.10.24 | CVE-2024-38094 - Microsoft SharePoint Deserialization vulnerability exploited in the wild | ALERTS | VULNEREBILITY | CVE-2024-38094 is a deserialization vulnerability affecting Microsoft SharePoint, which was initially disclosed and patched back in July 2024. The flaw rated with a CVSS score of 7.2 arises from the product deserializing data without enough verification that the resulting data output will be valid. Successful exploitation of this flaw could allow the attackers to inject and execute arbitrary code withing the context of the vulnerable application. Following the public reports of this vulnerability being exploited in the wild, it has been added to the CISA's Known Exploited Vulnerabilities (KEV) catalog just this week. |
27.10.24 | Prometei botnet activity | ALERTS | BOTNET | New Prometei botnet activity has been reported in the wild. The botnet has been historically used mostly for Monero cryptomining operations but with time the attackers behind it updated the botnet capabilities to conduct even more complex attacks, allowing for a full control over the infected machines a well as additional arbitrary payload deployments. Prometei distribution campaigns often leverage exploitation of previously disclosed RCP or SMB vulnerabilities, usage of domain generation algorithm (DGA) mechanisms for C2 communication as well as webshell deployments within the attack chain. |
27.10.24 | DarkComet Backdoor | ALERTS | VIRUS | DarkComet is a powerful Remote Access Trojan (RAT) that remains a significant threat because of its stealthy operations and comprehensive functionality. It enables attackers to remotely control infected devices, exfiltrate sensitive data, and deploy further malware. It can evade detection by altering file attributes, manipulating registry keys and escalating privileges. Additionally, it communicates with a command-and-control (C2) server to carry out various commands including capturing keystrokes and controlling display devices. |
27.10.24 | Threat actors distribute WarmCookie malware via various campaigns | ALERTS | VIRUS | WarmCookie is malware that has been observed being distributed through various campaigns, including malicious emails. This malware provides initial access to a compromised victim and is used to establish persistence. Additional functionality associated with WarmCookie includes remote command execution, file system manipulation, and payload delivery, among others. A recent report by Cisco Talos provides a technical analysis as well as data to support attribution of the malware to the threat actor group TA866. |
27.10.24 | Crystal Rans0m: Rust-Based Hybrid Ransomware | ALERTS | RANSOM | Crystal Rans0m is a Rust-based hybrid ransomware that combines file encryption with data-stealing capabilities that has been observed targeting Italy and Russia. The malware can steal browser data, Discord tokens, Steam files, Riot Games data and utilizes Discord webhooks for data exfiltration. It also employs anti-VM and anti-debugging techniques. The ransom note demands payment in Monero and provides a Session ID for communication. |
27.10.24 | CVE-2024-9680 - Mozilla Firefox Remote Code Execution vulnerability | ALERTS | VULNEREBILITY | CVE-2024-9680 is a recently disclosed Remote Code Execution (RCE) vulnerability affecting Mozilla Firefox and Thunderbird software. The vulnerability has been assigned a critical CVSS score of 9.8 and arises from a "use-after-free" flaw in the animation timeline component of the browser. Successful exploitation might allow the attackers to run arbitrary and potentially malicious code within the content process of the browser. The vulnerability has been added to CISA's Known Exploited Vulnerabilities (KEV) catalog, indicating reports of an active exploitation in the wild. The flaw has already been addressed in latest software versions released by Mozilla. |
27.10.24 | Phemedrone Stealer | ALERTS | VIRUS | Phemedrone is an open-source infostealer variant observed being distributed in the wild this year. The malware is written in C# and has the functionality to collect and exfiltrate various sensitive information such as login credentials, data stored in browsers, cookies, credit card information, cryptocurrency wallets, files stored in "My Documents" folders or data from other 3rd party apps such as Steam, Discord or Telegram. |
27.10.24 | Phemedrone Stealer | ALERTS | VIRUS | Earlier this year, Akira developed a new version of its ransomware encryptor and has since been observed using another novel iteration of the encryptor that targets both Windows and Linux systems. Akira typically employs a double-extortion tactic, exfiltrating critical data before encrypting the victim's systems. However, starting in early 2024, the group appears to be shifting away from encryption tactics, focusing solely on data exfiltration. |
27.10.24 | Akira Ransomware Evolution: A move towards cross-platform adaptability | ALERTS | RANSOM | Earlier this year, Akira developed a new version of its ransomware encryptor and has since been observed using another novel iteration of the encryptor that targets both Windows and Linux systems. Akira typically employs a double-extortion tactic, exfiltrating critical data before encrypting the victim's systems. However, starting in early 2024, the group appears to be shifting away from encryption tactics, focusing solely on data exfiltration. |
27.10.24 | Ghostpulse Malware: Shifting tactics from PNGs to Pixel values | ALERTS | VIRUS | According to recent reports, Ghostpulse malware has evolved its tactics by shifting from hiding its encrypted configuration and payload in the IDAT chunk of PNG files, to embedding it directly within the pixel values themselves to evade detection. In recent campaigns, attackers have employed social engineering techniques such as CAPTCHA validations to deceive users which ultimately triggers malicious commands via Windows keyboard shortcuts. |
27.10.24 | CVE-2024-28987 - SolarWinds Web Help Desk Hardcoded Credential vulnerability | ALERTS | VULNEREBILITY | CVE-2024-28987 is a recently disclosed hardcoded credential vulnerability affecting the SolarWinds Web Help Desk (WHD) software. The flaw is rated as critical (CVSS score 9.1 and if successfully exploited could allow remote unauthenticated attackers to access internal software functionality and modify data. The vulnerability has been added to CISA's Known Exploited Vulnerabilities (KEV) catalog, indicating reports of an active exploitation in the wild. Software vendor has already released a patched version of the WHD application - 12.8.3 HF2 that addresses this vulnerability. |
27.10.24 | Threat actors abusing open-source phishing framework to deliver RATS | ALERTS | VIRUS | A recent report by (CTA) member Cisco Talos has recently disclosed a new phishing campaign abusing the open-source phishing readiness assessment framework named 'Gophish' to deploy one of two attack chains. The first uses Pidief infected Office docs to deploy a newly discovered PowerShell RAT dubbed 'PowerRAT' while the second employs malicious HTML files and GOLoader to deploy DCRAT. |
27.10.24 | IcePeony: China-linked APT group targeting Southeast Asian governments | ALERTS | APT | A recently identified APT group linked to China dubbed IcePeony has been detected conducting malware campaigns targeting government agencies and institutions in countries such as India, Mauritius, and Vietnam. The group's attack vector often involves SQL injection, leading to compromises via web shells and backdoors that utilize custom malware like "IceCache" to infiltrate networks. |
27.10.24 | Lumma Stealer delivered via Fake CAPTCHA | ALERTS | VIRUS | Researchers are monitoring an ongoing phishing campaign where attackers appear to have upped their tactics from traditional phishing to incorporating the use of fake CAPTCHA pages and exploiting legitimate software. The intention being to eventually lure users into executing a payload called Lumma Stealer. This infostealing malware is a MaaS (Malware-as-a-Service) variant that steals sensitive data such as passwords and cryptocurrency information. |
27.10.24 | Phishing Campaign Delivering Wiper Malware | ALERTS | PHISHING | A recent campaign was observed by researchers where threat actors were seen targeting Israeli organizations, by impersonating a certain antivirus vendor and sending out phishing emails warning of state-backed threats. The emails include a link to a fake program that downloads a malware called Wiper, designed to erase data. |
27.10.24 | Phishing attack aims at Meta Ads Professionals with Quasar RAT | ALERTS | PHISHING | A malware campaign targeting job seekers and digital marketing professionals has been reported. The campaign specifically focuses on Meta Ads professionals and is believed to be driven by a Vietnamese Threat Actor. The attack chain begins with a phishing email containing an archive attachment that disguises a malicious LNK file as a PDF. When opened, the LNK file triggers PowerShell commands that lead to the download and execution of additional scripts, ultimately resulting in the delivery of the Quasar RAT payload. This gives attackers full control over the compromised system for activities such as data theft, surveillance and distributing more malware. The malware possesses anti-VM and anti-debug capabilities and establishes persistence by hiding in system directories. |
27.10.24 | ClickFix Tactic: New malware campaigns preying on Google Meet users | ALERTS | CAMPAIGN | Various malware campaigns utilizing the emerging ClickFix tactic have been reported since June 2024. One such campaign distributing infostealers through fake Google Meet pages, a popular video communication service has been reported in the wild. Users are lured by emails that appear to be legitimate Google Meet invitations for work meetings, conferences, or other significant events. Once lured, they are directed to a fake page that displays a pop-up about a technical issue. Clicking on this pop-up triggers the infection process, leading to the delivery of infostealer payloads such as Stealc, Rhadamanthys or AMOS depending on the operating system. |
27.10.24 | Recent malicious activities attributed to the UAT-5647 threat group | ALERTS | GROUP | According to the report published by Cisco Talos, UAT-5647 threat group has been targeting entities in Ukraine and Poland in their most recent campaigns. The threat actors have been distributing two distinct downloader variants called RustyClaw and MeltingClaw, a new RomCom malware variant dubbed SingleCamper, as well as DustyHammock and ShadyHammock backdoors. The wave of attacks has been ongoing since late 2023 and has been focused on data exfiltration and establishing long term access to the compromised environments. |
27.10.24 | Emerging Stealer Variants: Divulge, DedSec, and Duck Stealers | ALERTS | VIRUS | Multiple stealers have been observed being advertised on hacker forums, GitHub, and Telegram, all developed and promoted by the same entity. Notable variants include Divulge Stealer (a copy of Umbral), DedSec Stealer (based on Doenerium), and Duck Stealer (a derivative of AZStealer). These variants primarily target Discord data, browser information, cryptocurrency wallets and employ anti-analysis techniques to evade detection and operate effectively in the background. |
27.10.24 | TrickMo targeting Android users with fake lock-screen | ALERTS | VIRUS | Security researchers have recently disclosed a new variant of TrickMo, a mobile banking trojan that targets Android and iOS users. This new variant comes with some new functionality in addition to the existing capabilities, such as screen recording, remote control, and permissions granting. Now TrickMo includes the ability to steal screen lock codes and unique device identifiers from infected devices. When the malicious app is run it will display a full screen webpage designed to mimic the standard lock-screen, and if the user inputs their lock-screen code it will be exfiltrated via PHP to the attackers for later use. |
27.10.24 | Lockbit ransomware pretender targets macOS and Windows environments for data theft | ALERTS | RANSOM | A new campaign leveraging a malware variant disguised as Lockbit ransomware has been reported in the wild. The GO-based malware targets both macOS and Windows users in attempts to encrypt and exfiltrate confidential data. The stolen information is uploaded to Amazon AWS S3 buckets controlled by the attacks. The malware encrypts user files, deletes shadow copies on the infected machines and appends .abcd extension to the encrypted files. The ransomware then changes the desktop wallpaper to one copied over from Lockbit 2.0 attacks. This action is clearly a tactic meant to pressure the victims in paying the demanded ransom. |
27.10.24 | Microsoft Windows Kernel TOCTOU Race Condition Vulnerability (CVE-2024-30088) | ALERTS | VULNEREBILITY | CVE-2024-30088 is a Time-Of-Check Time-Of-Use (TOCTOU) race condition vulnerability in the Microsoft Windows Kernel. It arises when the state of a resource is modified between its validation (check) and actual use, allowing attackers to exploit the gap for privilege escalation. When successfully exploited, this vulnerability can enable attackers to execute code with elevated privileges on affected systems. It is now part of CISA's Known Exploited Vulnerabilities (KEV) catalog, indicating active exploitation in the wild. |
27.10.24 | Leafperforator APT group expands operations into the Middle East and Africa | ALERTS | APT | Researchers recently published a warning about the Telegram account '@reserveplusbot', linked to a specific application and serving as a contact for technical support. The suspicious messages urged users to install a ZIP file that contains malware. The executable file inside is a variant of Meduza Stealer, which steals files and evades detection by modifying Microsoft Defender settings. |
27.10.24 | Meduza Stealer | ALERTS | VIRUS | Researchers recently published a warning about the Telegram account '@reserveplusbot', linked to a specific application and serving as a contact for technical support. The suspicious messages urged users to install a ZIP file that contains malware. The executable file inside is a variant of Meduza Stealer, which steals files and evades detection by modifying Microsoft Defender settings. |
27.10.24 | New Linux variant of FASTCash malware discovered | ALERTS | VIRUS | A new Linux variant of the FASTCash malware (a tool which CISA has attributed to North Korea) has been discovered. FASTCash is malware that is implanted within compromised networks and leveraged to perform unauthorized banking transactions. This occurs by way of intercepting transaction messages and generating fraudulent responses in return, thereby defrauding the ATM/PoS card user. |
27.10.24 | CVE-2024-44849 - Qualitor Remote Code Execution (RCE) vulnerability | ALERTS | VULNEREBILITY | CVE-2024-44849 is a critical (CVSS: 9.8) Remote Code Execution (RCE) vulnerability in Qualitor, which is a platform for managing customer service processes and centralizing services. This exploit allows remote code execution (RCE) through an arbitrary file upload in Qualitor version before 8.24. If successfully exploited, this vulnerability might allow remote attackers to compromise the host system, potentially resulting in a complete system takeover. Symantec's network protection technology, Intrusion Prevention System (IPS) blocks these vulnerability exploitation attempts to prevent further infection/damage to the system. |
27.10.24 | ThunderKitty malware | ALERTS | VIRUS | ThunderKitty is a GO-based open-source infostealer variant seen in the wild. The malware has the functionality to collect miscellaneous information from infected machines including banking details, Discord session tokens, cookies, browser history and other data stored in the browsers, etc. ThunderKitty implements several evasion and anti-analysis techniques, VM environment and Debugger presence detection as well as persistence mechanisms. |
27.10.24 | CVE-2024-45519 - Remote Command Execution vulnerability in Zimbra Collaboration Suite | ALERTS | VULNEREBILITY | CVE-2024-45519 is a recently disclosed Remote Code Execution (RCE) vulnerability in Zimbra Collaboration Suite (ZCS) affecting versions before 8.8.15 Patch 46, 9 before 9.0.0 Patch 41, 10 before 10.0.9, and 10.1 before 10.1.1. The flaw stems from user input sanitation failure that if successfully exploited might allow the unauthenticated attackers to execute arbitrary code within the context of the vulnerable Zimbra installations. |
27.10.24 | INTERLOCK Ransomware | ALERTS | RANSOM | A new ransomware actor, going by the name INTERLOCK, has recently emerged in the threat landscape. This group appears to employ a double-extortion tactic. On successful compromise, encrypted files are appended with the ".interlock" extension. |
27.10.24 | Attackers still using SHTML files to target recipients with phishing | ALERTS | PHISHING | Symantec has recently observed a new phishing campaign using attached SHTML files disguised as import and or payment forms. The messages attempt to entice users to open the attached files to resolve import or billing issues. If the recipient opens the form they are greeted with a fake 'DHL' login page the exfiltrates the entered credentials to a private Telegram channel for the attacker to use later. |
27.10.24 | MiyaRat: The latest tool from the Bitter APT group | ALERTS | VIRUS | The Bitter APT group, recognized for its sophisticated cyber espionage activities targeting East and South Asia, has been observed deploying a new malware known as MiyaRat. This malware is capable of collecting system information, capturing screenshots, performing file uploads and downloads, and exfiltrating data to its command-and-control (C2) server, where it waits for further instructions. |
27.10.24 | CVE-2024-43363 - Cacti RCE vulnerability | ALERTS | VULNEREBILITY | CVE-2024-43363 is a remote code execution (RCE) vulnerability in Cacti, a network monitoring and fault management framework. Successful flaw exploitation happens via log poisoning on the vulnerable instances. This exploitation could ultimately allow the attackers for arbitrary command execution. The vulnerability has been fixed in product version 1.2.28 or higher. |
27.10.24 | Abuse of Code-Signing Certificates in Lumma Stealer deployment via HijackLoader | ALERTS | VIRUS | A malware campaign has been observed deploying Lumma Stealer using HijackLoader. The attack vector employs a "fake CAPTCHA" to lure users into executing a PowerShell payload that downloads a ZIP archive containing either a DLL or a signed HijackLoader binary. This binary is then loaded via DLL sideloading, ultimately installing Lumma Stealer. Multiple code-signing certificates were abused to sign the malware, obtained from various issuing certificate authorities that are largely automated, requiring only a valid company registration number and a contact person. |
27.10.24 | CoreWarrior Malware | ALERTS | VIRUS | Researchers investigated a malware named CoreWarrior and found that this variant aggressively spreads by creating numerous copies, connecting to various IP addresses, opening multiple backdoor access points, and intercepting Windows UI elements for surveillance purposes. |
27.10.24 | Core Werewolf utilizes AutoIt loader and Telegram for Cyber attacks | ALERTS | VIRUS | The Core Werewolf threat actor group, which primarily targets Russia's defense industry and critical infrastructure, has been observed using new tools including an AutoIt loader and delivering malicious files via Telegram in addition to email. As part of their attack chain, they utilize RAR archives containing SFX executables that deploy obfuscated AutoIt scripts, legitimate AutoIt interpreters, and decoy PDF documents. The loader collects system information, encrypts and transfers files, and communicates with a command-and-control server for data exfiltration. To evade detection, the attackers employ deceptive file names that correspond to the content of the decoy documents. |
27.10.24 | ErrorFather Android Trojan | ALERTS | VIRUS | Cerberus Android banking trojan came to light in 2019, and this variant utilizes a multi-stage dropper to deploy its payload and can execute financial fraud through remote attacks, keylogging, and overlay tactics. The emergence of ErrorFather highlights the persistent danger of repurposed malware, as cybercriminals continue to exploit leaked source code years after the original Cerberus malware was discovered. |
27.10.24 | Demodex targeting American telecommunications | ALERTS | VIRUS | APT group 'Squash' has been reported to be utilizing Demodex to target American telecommunications providers. Demodex, a rootkit, is used to establish persistence and then files with fake file headers (PNG, JPEG and WAV have been observed) are used to help evade detection and utilized to establish C2 communications. |
27.10.24 | CVE-2024-43573 - Microsoft Windows MSHTML Platform spoofing vulnerability | ALERTS | VULNEREBILITY | CVE-2024-43573 is a spoofing vulnerability that has been recently disclosed as part of the October 2024 Patch Tuesday. The vulnerability is affecting Microsoft Windows MSHTML Platform. Assigned with the CVSS score of 6.5 (Moderate) the flaw might allow attackers to execute arbitrary code within the context of the vulnerable application. CVE-2024-43573 has also been added to the "Known Exploited Vulnerabilities Catalog" by CISA, following reports of active exploitation in the wild. |
27.10.24 | New Pronsis Loader malware leveraged for Lumma Stealer and Latrodectus delivery | ALERTS | VIRUS | Pronsis Loader is a new malware variant leveraged recently in campaigns delivering Lumma Stealer and Latrodectus payloads. The malware utilizes executables compiled in JPHP programming language, which is a Java implementation of PHP. Pronsis also uses Nullsoft Scriptable Install System (NSIS) for the deployments in the observed campaigns. The malware implements certain detection evasion techniques such as exclusion of the user's profile directory path from Windows Defender scanning. |
27.10.24 | LemonDuck: The evolving Multi-Platform cryptomining malware | ALERTS | VIRUS | LemonDuck, a well-known cryptomining malware, has evolved into a multi-platform threat and has been observed exploiting SMB vulnerabilities, particularly EternalBlue, as part of its attack vector to gain network access. The malware employs techniques such as brute-force attacks, creating hidden administrative shares, and executing malicious actions via batch files and PowerShell scripts. LemonDuck has the capability to create scheduled tasks, disable Windows Defender, and utilize anti-detection mechanisms for persistence. It disguises itself as legitimate system services, manipulates firewall settings, in addition to using Mimikatz for credential theft. |
27.10.24 | CVE-2024-7954 - Remote Code Execution vulnerability in SPIP Porte Plume Plugin | ALERTS | VULNEREBILITY | CVE-2024-7954 is a critical (CVSS score 9.8) Remote Code Execution (RCE) vulnerability in porte_plume plugin used by SPIP versions prior to 4.30-alpha2, 4.2.13, and 4.1.16. SPIP is free software content management system (CMS) for publishing websites. The flaw might allow a remote, unauthenticated attacker to send a crafted HTTP request and execute arbitrary PHP code as the SPIP user. The attack can fully compromise the server to steal confidential information and pivot to the internal network. Symantec's network protection technology, Intrusion Prevention System (IPS) blocks these vulnerability exploitation attempts to prevent further infection/damage to the system. |
27.10.24 | Lynx ransomware - a formidable cyber-extortion threat | ALERTS | RANSOM | A new research published by Palo Alto Networks Unit 42 indicates that the ransomware variant known as Lynx shares a significant portion of its source code with the INC ransomware. The threat operators of Lynx have actively targeted organizations in various sectors (architecture, real estate, retail, and financial/environmental services) in the U.S. and UK. This ransomware operates using a RaaS model, and is disseminated through a variety of attack vectors (deceptive phishing mails, malicious downloads to infect users systems, and hacking forums etc.). Once afflicted with Lynx ransomware the victim(s) data is exfiltrated before encryption following the double extortion approach to obtain a ransom payment. |
27.10.24 | CVE-2024-43572 - Microsoft Windows Management Console RCE vulnerability | ALERTS | VULNEREBILITY | CVE-2024-43572 is a Microsoft Windows Management Console remote code execution (RCE) vulnerability recently disclosed and patched as part of the October 2024 Patch Tuesday. The vulnerability is exploited through execution of specially crafted malicious Microsoft Saved Console (MSC) files. Successful exploitation of this flaw could allow attackers to run arbitrary code within the context of the application. CVE-2024-43572 has also been added to the "Known Exploited Vulnerabilities Catalog" by CISA, following reports of active exploitation in the wild. |
27.10.24 | Perfctl malware campaign exploiting RocketMQ vulnerability hits Linux Servers worldwide | ALERTS | VULNEREBILITY | A Perfctl malware campaign targeting millions of Linux servers worldwide has been observed. The campaign exploits the CVE-2023-33246 RocketMQ vulnerability. The malware employs rootkits for stealth and process masquerading along with TOR for command and control (C2) communication. As the final payload, it deploys a cryptominer alongside proxy hijacking software. Additionally, the malware utilizes temporary directories and modified system utilities to evade detection. |
27.10.24 | Kransom ransomware targets gamers by imitating Honkai: Star Rail installer | ALERTS | RANSOM | Reports indicate that Honkai: Star Rail, a popular role-playing game, is being exploited by a new ransomware dubbed Kransom. This ransomware spreads through drive-by-download campaigns, enticing victims by masquerading the malicious binary as a legitimate StarRail game installer and employing valid digital certificates. Upon execution, the malicious DLL is loaded using a dynamic-link library (DLL) side-loading technique, initiating the ransomware’s encryption process. |
27.10.24 | Havoc Framework | ALERTS | VIRUS | Researchers have found that cybercriminals are increasingly leveraging pen testing tools like the Havoc framework to evade security systems. This tool is less recognized than others, such as Cobalt Strike or Metasploit, which makes it harder to spot. The Mysterious Werewolf group is using strategies similar to the Mythic framework, and phishing emails that mimic legitimate organizations remain a common tactic for gaining unauthorized access. |
27.10.24 | CleanUpLoader Leveraged By Rhysida | ALERTS | VIRUS | A recent report shed light on a loader/backdoor known as "CleanUpLoader," used by the double-extortion ransomware actor "Rhysida" as an initial vector of infection. It is typically disguised as software installers like Microsoft Teams or Google Chrome. The loader facilitates communication with multiple command-and-control (C2) servers, allowing Rhysida to establish persistence and perform data exfiltration. |
27.10.24 | New Ivanti CSA vulnerabilities exploited in the wild | ALERTS | VULNEREBILITY | Ivanti has published a new security advisory regarding three recently disclosed Ivanti CSA (Cloud Services Application) vulnerabilities. The reported vulnerabilities are as follows. |
27.10.24 | Lua-based malware variants target the educational sector | ALERTS | VIRUS | There has been a recent surge in Lua-based malware targeting students, specifically targeted attacks capitalizing on popular games within the student gamer community who are searching for gaming cheats. Fake game cheats are being leveraged by threat actors to trick users into downloading this malware. Lua-based malware is capable of establishing persistence on infected systems, exfiltrating sensitive harvested credential information, and delivering additional payloads. |
27.10.24 | Horus Protector | ALERTS | VIRUS | A new malware distribution service has been uncovered called Horus Protector that claims to be a Fully Undetectable (FUD) crypter and distributes various malware families, including AgentTesla, Remcos, Snake, and NjRat. The service distributes malware using a .zip file that contains a VBE script and gathers information from users' machines to transmit to its server. |
27.10.24 | Threat actors associated with North Korea target tech job seekers with malware | ALERTS | APT | The Contagious Interview campaign started in 2023 and is perpetuated by threat actors associated with North Korea. Recent activity has been observed that can be tied to this campaign with threat actors posing as job recruiters and luring victims into supposed interviews. Newer variants of previously used malware targeted individuals seeking jobs in the tech industry. The BeaverTail downloader and stealer is responsible for downloading the final InvisibleFerret backdoor payload. Researchers in Palo Alto Networks Unit 42 published a report with technical details of this activity. |
27.10.24 | A Recent PhantomLoader Campaign | ALERTS | VIRUS | PhantomLoader is a malware that disguises itself as a legitimate 32-bit DLL for a certain antivirus software and was recently found posing as “PatchUp.exe,” a genuine component of the software. The malicious loader was observed using binary patching and self-modifying techniques to load rust-based malware dubbed SSLoad into memory. |
27.10.24 | Malvertising campaign leads to malicious Windows and Mac payloads | ALERTS | VIRUS | A recently published report identified a campaign whereby advertisers are pushing ads for utility software, such as Slack or Notion, which lead to downloads of malicious payloads. The advertisers registered under existing businesses and distributed ads that target both Windows and Mac users. After multiple redirects, the users are provided downloads of stealer type malware which are masquerading as the advertised software. |
27.10.24 | Yunit Stealer - an infostealing malware with geofencing capabilities | ALERTS | VIRUS | Yunit Stealer is a malware variant recently distributed in the wild. Yunit has extensive infostealing capabilities including theft and exfiltration of credentials, credit card data, cryptocurrency wallets, cookies, auto-fill data and others. The collected information is exfiltrated via Discord or Telegram webhooks back to the attackers. Yunit employs various persistence techniques, obfuscation, defense evasion as well as some geofencing techniques ensuring only victims from targeted geographic locations will get infected with the malware. |
27.10.24 | Vilsa Stealer | ALERTS | VIRUS | Vilsa Stealer is a new infostealer malware variant identified in the wild. The malware has the functionality to exfiltrate miscellaneous confidential data from the infected machine including: browser data, credentials, autofill data, cookies, banking information, cryptocurrency wallets, Discord tokens and Telegram data, among others. The extracted information is uploaded back to the remote attackers by leveraging GoFile API. Vilsa Stealer also employs some anti-analysis and anti-VM capabilities meant to make the detection and protection against this infostealer more difficult. |
27.10.24 | Falcon Keylogger | ALERTS | VIRUS | Falcon is a keylogger variant recently active in the wild. Older samples of this malware date back even to 2019 while the latest observed are from just last month. Falcon has the functionality to record keystrokes on the infected machine, collect system information, screenshots, etc. The collected data is consecutively exfiltrated to the C2 servers controlled by the attackers. Keyloggers such as Falcon can be used by threat actors for the purpose of gaining access to confidential information including credentials, banking data and others. |
27.10.24 | Nunu Stealer malware | ALERTS | VIRUS | Nunu Stealer is a recently discovered Python-based infostealing malware variant which is based off an older Akira Stealer strain. The functionality includes exfiltration of various confidential information such as banking details, credit card data, credentials, autofill data stored in browsers, cookies, 3rd app session data, Discord tokens, cryptocurrency wallets and more. Nunu can be potentially used by attackers to compromise various user accounts and leverage those for further intrusions. |
27.10.24 | VeilShell: A new threat from North Korea's Vedalia APT group | ALERTS | APT | According to reports, threat actors linked to North Korea have been deploying a previously undocumented backdoor and remote access trojan (RAT) called VeilShell in a campaign targeting Southeast Asian countries. This activity is attributed to the Vedalia APT group (aka APT37, ScarCruft, Reaper) |
27.10.24 | SmartLoader Delivering Lumma Stealer | ALERTS | VIRUS | SmartLoader has been traced back to July 2024, involving a private GitHub account called "user-attachments." It starts with a zip archive containing four files: compiler.exe, conf.txt, Launcher.bat, and lua51.dll. The user runs Launcher.bat, which executes compiler.exe with conf.txt, triggering SmartLoader and deploying Lumma Stealer. This infostealer written in C is known to steal data stored in the system browsers as well any present cryptocurrency wallets. |
27.10.24 | Key Group: Targeting Russian users with evolving ransomware | ALERTS | RANSOM | The Key Group is a financially motivated ransomware group that primarily targets Russian users and is known for negotiating with victims via Telegram. Like other groups that leverage leaked ransomware builders, Key Group predominantly utilizes the Chaos ransomware builder, among others, and operates a GitHub repository for its command and control (C2) infrastructure. Discovered in April 2022, the group has developed several ransomware variants over time, including Chaos, Annabelle, RuRansom, Hakuna Matata, and the latest NoCry variant. |
27.10.24 | BabyLockerKZ - MedusaLocker Ransomware variant | ALERTS | RANSOM | BabyLockerKZ ransomware is a variant of MedusaLocker which has been active since 2023. This variant uses many of the same TTPs as seen in previous MedusaLocker attacks (publicly available tools, custom tools, lolbins, chat and leak sites). The threat actor responsible for this ransomware has been active since 2022 and has targeted victims globally. Most recent victims have been located in South America. Researchers at Cisco Talos have published additional details regarding this malware. |
27.10.24 | Silver Oryx Blade - a new banking malware targeting Brazil | ALERTS | VIRUS | Silver Oryx Blade is a new banking trojan discovered by the researchers from Scitum. The malware prevalently targets victims from Brazil and attempts to steal banking information from the compromised machines. The infection chain is initiated via phishing emails leveraging financial or tax related lures. In further attack stages the threat actors use malicious .zip archives, .msi droppers as well as .dll loaders. Silver Oryx Blade monitors for data related to over 50 banking and financial institutions and the extracted information is forwarded to the C2 servers controlled by the attackers. |
27.10.24 | Gorilla Botnet: A new global threat based on Mirai code | ALERTS | BOTNET | Reports indicate a surge in activity from a new botnet family called Gorilla Botnet, which is targeting telecommunications, universities, and the gaming industry worldwide. This botnet is a modified version of the Mirai source code and is compatible with various CPU architectures, including ARM, MIPS, x86_64, and x86. It boasts advanced DDoS attack methods and employs multiple techniques for persistence. |
27.10.24 | CeranaKeeper APT Campaign | ALERTS | APT | A recent CeranaKeeper APT campaign was observed by researchers. This China-linked threat actor targets government entities in Thailand, Myanmar, the Philippines, Japan, and Taiwan. The group continuously updates its tools, such as backdoors, to evade detection and exploits cloud services like Dropbox and OneDrive for custom solutions. They also leverage GitHub’s features to create a covert reverse shell, using the platform as their dedicated C2 server. |
27.10.24 | Fake Update Campaign Delivering WarmCookie Malware | ALERTS | CAMPAIGN | A new campaign in France is using compromised websites to distribute the WarmCookie backdoor through fake update prompts for popular applications like Google Chrome and Java. This tactic, employed by the threat group 'SocGolish', tricks users into downloading malicious software masquerading as legitimate updates for browsers and applications like Java and VMware. The updated WarmCookie can steal data, execute commands, and run files, making it a significant threat. |
27.10.24 | Defi Ransomware | ALERTS | RANSOM | Defi is the newest malware variant from the Makop ransomware family. The malware encrypts user files and appends .defi1328 to them, alongside of a developers' email address and a victim's unique ID. The ransom note is dropped in form of text file called "README-WARNING.txt" within various on the disk. The malware will also change the desktop wallpaper. Defi ransomware comes with functionality to delete the volume shadow copies on the infected machines. |
27.10.24 | Stonefly threat group continues to launch extortion attacks against US targets | ALERTS | GROUP | Symantec’s Threat Hunter Team has found evidence that the North Korean Stonefly group (aka Andariel, APT45, Silent Chollima, Onyx Sleet) is continuing to mount financially motivated attacks against organizations in the U.S., despite being the subject of an indictment and a multi-million dollar reward. |
27.10.24 | K4Spreader and Hadooken Latest Attacks | ALERTS | VULNEREBILITY | Recent research identified an infection chain targeting Windows and Linux systems through Oracle WebLogic vulnerabilities (CVE-2017-10271 and CVE-2020-14883). The attacker used Python and Bash scripts to deploy K4Spreader malware, which delivered the Tsunami backdoor and a cryptominer. A PowerShell script was also attempted for Windows systems. Another research team reported a separate attack in which Hadooken malware exploited a configuration vulnerability in WebLogic servers, using shell and Python scripts to install a cryptominer and Tsunami malware. |
27.10.24 | New Rast ransomware threat targets Chinese government entities | ALERTS | RANSOM | A new ransomware threat called Rast has been identified, specifically targeting Chinese government entities. The attack vector includes RDP brute-forcing and exploiting N-day vulnerabilities to gain access to border servers, followed by the manual deployment of ransomware components. Once deployed, Rast uploads the machine name and a unique identifier to a remote MySQL database. The ransomware appears to have evolved over time, with the latest variant requiring manual operation via a console interface upon startup, necessitating direct attacker involvement to initiate the ransom process. |
27.10.24 | Active malware campaign targeting Russian energy companies and Electronics suppliers | ALERTS | CAMPAIGN | A new malware campaign targeting Russian energy companies and electronic component suppliers has been observed. The malware spreads through email attachments or Yandex Disk links, using RAR archives that contain LNK files to download and execute malicious HTA files. These files generate VBS scripts that ensure persistence via registry keys and scheduled tasks. The scripts copy and exfiltrate files from the user's home directory and Telegram data to the attacker's C2 server. |
27.10.24 | CVE-2024-43461 - Windows MSHTML Platform Spoofing vulnerability exploited in the wild | ALERTS | VULNEREBILITY | CVE-2024-43461 is a Windows MSHTML spoofing vulnerability recently disclosed as part of the September 2024 Patch Tuesday. Successful exploiting of this flaw might allow attackers to execute arbitrary code within the context of the application. This flaw has been reported as being exploited in zero-day attacks in conjunction with another MSHTML vulnerability from July - CVE-2024-38112. |
27.10.24 | North Korean hackers target Cryptocurrency users on LinkedIn with RustDoor malware | ALERTS | CRYPTOCURRENCY | In early September, the FBI warned of North Korean threat actors targeting the crypto industry. A campaign has been reported where these actors attempt to lure potential victims on LinkedIn to deliver RustDoor malware. One user was approached by someone impersonating a recruiter for a legitimate decentralized cryptocurrency exchange (DEX) technology firm, supported by professional-looking websites to enhance the legitimacy of the fake entities. |
27.10.24 | CVE-2024-6670 - Progress WhatsUp Gold SQL Injection vulnerability | ALERTS | VULNEREBILITY | CVE-2024-6670 is a recently disclosed SQL Injection vulnerability affecting Progress WhatsUp Gold, which is a well known network monitoring software. Successful exploitation of this flaw could allow an unauthenticated attacker to retrieve the user's encrypted passwords. The vulnerability has also been added to the "Known Exploited Vulnerabilities Catalog" by CISA, following reports of active exploitation in conjunction with another WhatsUp Gold vulnerability CVE-2024-6671. |
27.10.24 | Vulnerabilities in the Common UNIX Printing System (CUPS) | ALERTS | VULNEREBILITY | Symantec is aware of multiple vulnerabilities in the Common UNIX Printing System (CUPS) on UNIX-based systems, where an attacker could exploit certain configurations to gain unauthorized access and perform remote code execution (RCE), particularly by leveraging the cups-browsed service. |
27.10.24 | Advanced Rhadamanthys Infostealer: AI-Driven threats to Cryptocurrency security | ALERTS | VIRUS | A new version of Rhadamanthys Infostealer with advanced features including the use of artificial intelligence (AI) for optical character recognition (OCR) has been reported. |
27.10.24 | DCRat (aka Dark Crystal RAT) Trojan Malware | ALERTS | VIRUS | DCRat (aka Dark Crystal RAT) is a modular remote access Trojan available as malware-as-a-service since 2018. It can execute commands, log keystrokes, and exfiltrate data. Recently, it was delivered using HTML smuggling, which embeds and obfuscates the payload within HTML to evade security measures. |