Cyber Attack Techniques | Remote Access Tools | Use of Legitimate Software for Malicious Purposes Velociraptor forensic tool used for command and control tunneling
Cyber Espionage | Malware Distribution | Targeted Attacks Abandoned Sogou Zhuyin update server compromised and repurposed for Taiwan espionage operation
Cybersecurity Threats | Malware Exploitation | Ransomware Attacks Microsoft Windows vulnerability used to distribute PipeMagic RansomExx malware
Cybersecurity Threats | Open Source Vulnerabilities | Software Supply Chain Risks Investigators have identified XZ Utils backdoor embedded in Docker Hub images
Credential Harvesting | Remote Access Tools | Social Engineering Cybercriminals Employ Social Engineering Tactics to Secure Remote Access in 300 Seconds.
CL-STA-0969 Deploys Hidden Malware in Telecommunications Infrastructures Throughout a 10-Month Intelligence Gathering Operation.