Title |
Published |
Tags |
Description |
Number of indicators |
Ransomware in the Cloud: Scattered Spider Targeting Insurance and Financial Industries |
Sept. 11, 2024, 8:18 p.m. |
|
The Scattered Spider cybercriminal group is targeting cloud infrastructures in the insurance and financial sectors using advanced… |
12 |
Leaked Environment Variables Allow Large-Scale Extortion Operation of Cloud Environments |
Aug. 16, 2024, 8:08 a.m. |
|
Unit 42 researchers uncovered an extortion campaign that compromised and extorted multiple victim organizations by leveraging exp… |
37 |
Hackers Leveraging OneDrive Or Google Drive To Hide Malicious Traffic |
Aug. 7, 2024, 4:11 p.m. |
|
Cyber threat actors, including nation-state groups, are utilizing legitimate cloud services like Microsoft OneDrive and Google Dr… |
20 |
Cloud Cover: How Malicious Actors Are Leveraging Cloud Services |
Aug. 7, 2024, 11:18 a.m. |
|
In recent times, there has been a notable rise in the exploitation of legitimate cloud services by threat actors, including natio… |
20 |
DERO cryptojacking adopts new techniques to evade detection |
June 14, 2024, 10:11 a.m. |
|
This report examines the threat actors behind a 2023 cryptojacking campaign targeting misconfigured Kubernetes clusters, focusing… |
18 |
APT Attacks Using Cloud Storage |
June 11, 2024, 10:09 a.m. |
|
The report describes a malicious campaign where threat actors utilize cloud services like Google Drive, OneDrive, and Dropbox to … |
1 |
Commando Cat: A Novel Cryptojacking Attack Abusing Docker Remote API Servers |
June 7, 2024, 7:48 a.m. |
|
This report details a cryptojacking campaign exploiting exposed Docker remote API servers. Threat actors employ the cmd.cat/chatt… |
7 |
Analysis and Detection of CLOUD#REVERSER: An Attack Involving Threat Actors Compromising Systems Using A Sophisticated Cloud-Based Malware |
May 22, 2024, 7:39 a.m. |
|
Securonix Threat Research has uncovered a sophisticated malware campaign, dubbed CLOUD#REVERSER, that leverages popular cloud sto… |
16 |
Attackers exploiting new critical vulnerabilities on Kubernetes clusters |
May 21, 2024, 11:20 a.m. |
|
Microsoft security researchers have uncovered an attack campaign exploiting recently disclosed critical vulnerabilities in the Op… |
6 |
Analysis of APT Group's Use of Malicious LNK Files to Deliver RokRat Attack |
April 29, 2024, 6:40 p.m. |
|
The report details a recent cyber attack campaign by the APT-C-28 (ScarCruft) group, known for targeting organizations in Korea a… |
3 |