Cybercrime | Data Breach | Tax Fraud A hacker has been extradited to the United States for his involvement in tax fraud schemes that resulted in the theft of more than $2.5 million.
Cybersecurity Threats | Global Espionage | Malware Techniques Advanced DevilsTongue Windows spyware monitors users around the world.
Attack Techniques | Ransomware Operations | Targeted Industries Akira and Lynx ransomware are targeting Managed Service Providers (MSPs) by exploiting stolen login credentials and existing vulnerabilities.
Advanced Persistent Threats | Cybersecurity Threats | Malware Distribution Techniques Mustang Panda is targeting Windows users with malware known as ToneShell, which disguises itself as Google Chrome.
Cybersecurity Threats | Data Breaches | Social Engineering Tactics Google’s Salesforce accounts have been compromised in a continuing cyber attack, resulting in the theft of user information by hackers.
Cybersecurity Threats | Malware Distribution | Supply Chain Attacks North Korean cybercriminals are exploiting NPM packages to pilfer cryptocurrency and confidential information.
Cyber Espionage | Malware Techniques | Social Engineering Kimsuky APT hackers are utilizing LNK files as a means to deploy reflective malware, successfully evading detection by Windows Defender.
Cybercrime | Data Exfiltration | Malware Distribution Vietnamese cybercriminals have employed the PXA Stealer tool to target 4,000 IP addresses, successfully compromising 200,000 passwords worldwide.
Cybersecurity Threats | Malware Delivery Techniques | Remote Access Tools A recent malware attack is utilizing LNK files to deploy the REMCOS backdoor on Windows systems.
CL-STA-0969 Deploys Hidden Malware in Telecommunications Infrastructures Throughout a 10-Month Intelligence Gathering Operation.