Cybersecurity

Cybercriminals Combine Phishing and EV Certificates to Deliver Ransomware Payloads

Sep 15, 2023THNRansomware / Cyber Threat The threat actors behind RedLine and Vidar information stealers have been observed pivoting to ransomware through phishing campaigns that spread initial payloads signed with Extended Validation (EV) code signing certificates. “This suggests that the threat actors are streamlining operations by making their techniques multipurpose,” Trend Micro researchers said in […]

Cybersecurity

Latest fraud schemes targeting the payments ecosystem – Help Net Security

Threat actors continued to exploit technical misconfigurations through various fraud schemes, according to a new report from Visa. These include the use of malvertising and search engine optimization (SEO) techniques to cultivate compelling and effective phishing and social engineering campaigns, the utilization of emerging advanced language model (ALM) technologies, and the increased targeting of authentication […]

Cybersecurity

Chinese Redfly Group Compromised a Nation’s Critical Grid in 6-Month ShadowPad Campaign

Sep 12, 2023THNCritical Infrastructure Security A threat actor called Redfly has been linked to a compromise of a national grid located in an unnamed Asian country for as long as six months earlier this year using a known malware referred to as ShadowPad. “The attackers managed to steal credentials and compromise multiple computers on the […]

Cybersecurity

Charming Kitten’s New Backdoor ‘Sponsor’ Targets Brazil, Israel, and U.A.E.

Sep 11, 2023THNCyber Espionage / Malware The Iranian threat actor known as Charming Kitten has been linked to a new wave of attacks targeting different entities in Brazil, Israel, and the U.A.E. using a previously undocumented backdoor named Sponsor. Slovak cybersecurity firm is tracking the cluster under the name Ballistic Bobcat. Victimology patterns suggest that […]

Cybersecurity

Outlook Breach: Microsoft Reveals How a Crash Dump Led to a Major Security Breach

Sep 07, 2023THNCyber Attack / Email Hacking Microsoft on Wednesday revealed that a China-based threat actor known as Storm-0558 acquired the inactive consumer signing key to forge tokens and access Outlook by compromising an engineer’s corporate account. This enabled the adversary to access a debugging environment that contained information pertaining to a crash of the […]