Title |
Published |
Tags |
Description |
Number of indicators |
DERO cryptojacking adopts new techniques to evade detection |
June 14, 2024, 10:11 a.m. |
|
This report examines the threat actors behind a 2023 cryptojacking campaign targeting misconfigured Kubernetes clusters, focusing… |
18 |
APT Attacks Using Cloud Storage |
June 11, 2024, 10:09 a.m. |
|
The report describes a malicious campaign where threat actors utilize cloud services like Google Drive, OneDrive, and Dropbox to … |
1 |
Commando Cat: A Novel Cryptojacking Attack Abusing Docker Remote API Servers |
June 7, 2024, 7:48 a.m. |
|
This report details a cryptojacking campaign exploiting exposed Docker remote API servers. Threat actors employ the cmd.cat/chatt… |
7 |
Analysis and Detection of CLOUD#REVERSER: An Attack Involving Threat Actors Compromising Systems Using A Sophisticated Cloud-Based Malware |
May 22, 2024, 7:39 a.m. |
|
Securonix Threat Research has uncovered a sophisticated malware campaign, dubbed CLOUD#REVERSER, that leverages popular cloud sto… |
16 |
Attackers exploiting new critical vulnerabilities on Kubernetes clusters |
May 21, 2024, 11:20 a.m. |
|
Microsoft security researchers have uncovered an attack campaign exploiting recently disclosed critical vulnerabilities in the Op… |
6 |
Analysis of APT Group's Use of Malicious LNK Files to Deliver RokRat Attack |
April 29, 2024, 6:40 p.m. |
|
The report details a recent cyber attack campaign by the APT-C-28 (ScarCruft) group, known for targeting organizations in Korea a… |
3 |