Cybersecurity Threats | Malware Distribution | SEO Manipulation HiddenGh0st, Winos, and kkRAT using SEO strategies and GitHub pages
Cyber Espionage | Malware Distribution | Targeted Attacks Abandoned Sogou Zhuyin update server compromised and repurposed for Taiwan espionage operation
Cybercrime Campaign | Information Theft | Malware Distribution Counterfeit PDF editing software downloads TamperedChef malware
Cybercrime | Malware Distribution | Social Engineering ShadowCaptcha distributing ransomware & cryptominers via compromised WordPress sites
Malware Distribution | Phishing Campaigns | Remote Access Tools Phishing Attack Employs UpCrypter in Fraudulent Voicemail Emails to Distribute RAT Payloads.
Bandwidth Theft | Cybersecurity Threats | Malware Distribution Malicious actors exploiting video download site to distribute Proxyware malware
Cybersecurity Threats | Malware Distribution | Software Exploitation SmartLoader malware spread through GitHub repositories
Cybercrime Operations | Malware Distribution | Traffic Distribution Systems SocGholish malware is distributed through advertising tools and provides access to various groups such as LockBit and Evil Corp.
Cybersecurity Threats | Malware Distribution | Social Engineering Attacks Search results on Bing have been manipulated to distribute Bumblebee malware when users search for ‘ManageEngine OpManager’.
Cybersecurity Threats | Malware Distribution | Supply Chain Attacks North Korean cybercriminals are exploiting NPM packages to pilfer cryptocurrency and confidential information.
Cybercrime | Data Exfiltration | Malware Distribution Vietnamese cybercriminals have employed the PXA Stealer tool to target 4,000 IP addresses, successfully compromising 200,000 passwords worldwide.