Title |
Published |
Tags |
Description |
IOCs |
Pig Butchering Alert: Fraudulent Trading App targeted iOS and Android users |
October 4, 2024 |
|
A large-scale fraud campaign involving fake trading apps targeting Apple iOS and Android users across multiple regions has been u… |
9 |
Tweaking AsyncRAT: Using Python and TryCloudflare to Deploy Malware |
October 4, 2024 |
|
A new AsyncRAT malware campaign utilizes TryCloudflare quick tunnels and Python packages to deliver malicious payloads. The attac… |
15 |
CHARMING KITTEN |
October 4, 2024 |
|
Since June 2024, the Iran-nexus actor CHARMING KITTEN has been creating new network infrastructure for credential phishing, targe… |
11 |
Bulbature, beneath the waves of GobRAT |
October 4, 2024 |
|
This report examines an infrastructure used to control compromised edge devices transformed into Operational Relay Boxes for laun… |
120 |
perfctl: A Stealthy Malware Targeting Millions of Linux Servers |
October 4, 2024 |
|
A sophisticated Linux malware named 'perfctl' has been actively targeting millions of servers worldwide for the past 3-4 years. I… |
9 |
Threat actor believed to be spreading new MedusaLocker variant since 2022 |
October 4, 2024 |
|
A financially motivated threat actor has been active since 2022, delivering a MedusaLocker ransomware variant called 'BabyLockerK… |
11 |
Threat Brief: Understanding Akira Ransomware |
October 4, 2024 |
|
Akira is a prolific ransomware operating since March 2023, targeting multiple industries in North America, the UK, and Australia.… |
3 |
Stonefly: Extortion Attacks Continue Against U.S. Targets |
October 3, 2024 |
|
In several of the attacks, Stonefly’s custom malware Backdoor.Preft (aka Dtrack, Valefor) was deployed. This tool is exclusively … |
50 |
XWorm: Analysis of Latest Version and Execution Flow |
October 3, 2024 |
|
XWorm, a versatile tool discovered in 2022, enables attackers to access sensitive information, gain remote access, and deploy add… |
8 |
The Dark Knight Returns: Joker malware analysis |
October 3, 2024 |
|
The report details sophisticated command and control (C2) techniques employed by the APT41 threat group. APT41 uses custom malwar… |
8 |
|