Category cyber-attacks

Nation-State Hackers Exposed for Concealing Espionage Operations Within Crypto Miners

Recent research indicates that a nation-state actor known for prolonged cyber espionage activities has transitioned to using coin mining techniques. This strategic shift, attributed to the hacking group Bismuth, is aimed at evading detection while ensuring persistence within the systems of their targets. The Microsoft 365 Defender Threat Intelligence Team…

Read MoreNation-State Hackers Exposed for Concealing Espionage Operations Within Crypto Miners

Two Men Associated with China’s Salt Typhoon Hacker Group Likely Received Training at a Cisco Academy

Recent investigations into the possible links between two individuals associated with recent cyber incidents have revealed noteworthy findings. Cary, a researcher, examined two databases of Chinese names and collaborated with Yi Fuxian, a professor of Chinese demography at the University of Wisconsin–Madison. He found that the name Qiu Daibing (邱代兵)…

Read MoreTwo Men Associated with China’s Salt Typhoon Hacker Group Likely Received Training at a Cisco Academy

Experts Discover ‘Crutch’ Russian Malware Deployed in APT Attacks for Five Years

In a significant revelation, cybersecurity researchers have exposed a sophisticated backdoor and document-stealing malware that operated undetected from 2015 to early 2020. Dubbed “Crutch” by ESET, this malware has been linked to the notorious Turla group, a Russia-based advanced persistent threat (APT) known for targeting governments, embassies, and military institutions…

Read MoreExperts Discover ‘Crutch’ Russian Malware Deployed in APT Attacks for Five Years

A Comprehensive Guide to the Jeffrey Epstein Document Releases

House Oversight Committee Probes Epstein Case: Analyzing Recent Document Releases In recent months, the House Oversight and Government Reform Committee has been conducting a high-profile investigation into Jeffrey Epstein, the notorious financier and convicted sex offender. This inquiry, which has drawn significant public attention, involves a wide array of documents…

Read MoreA Comprehensive Guide to the Jeffrey Epstein Document Releases

TrickBot Malware Gains UEFI/BIOS Bootkit Feature to Avoid Detection

The notorious TrickBot malware, renowned for its adaptability, has recently expanded its arsenal to exploit firmware vulnerabilities as a potential means for deploying bootkits and gaining comprehensive control of compromised systems. This new capability, called “TrickBoot,” enables attackers to leverage widely accessible tools to scan devices for recognized weaknesses that…

Read MoreTrickBot Malware Gains UEFI/BIOS Bootkit Feature to Avoid Detection

Hackers-for-Hire Group Unveils New ‘PowerPepper’ In-Memory Malware

Cybersecurity Experts Uncover New Windows Backdoor Tied to DeathStalker Group Cybersecurity researchers announced on Thursday the discovery of an in-memory Windows backdoor, named “PowerPepper,” linked to a hacker-for-hire collective. This sophisticated malware is capable of executing malicious code remotely and extracting sensitive information from targets across Asia, Europe, and the…

Read MoreHackers-for-Hire Group Unveils New ‘PowerPepper’ In-Memory Malware

Cybercriminals Target Firms Connected to COVID-19 Vaccine Distribution

A sophisticated global phishing operation has been underway since September 2020, targeting entities involved in the distribution of COVID-19 vaccines. According to IBM Security X-Force researchers, these attacks, believed to be orchestrated by a nation-state actor, focus on the vaccine cold chain—the critical supply line managing the storage and transport…

Read MoreCybercriminals Target Firms Connected to COVID-19 Vaccine Distribution

Mount Locker Ransomware Introduces Double Extortion Scheme for Fellow Hackers

MountLocker Ransomware Expands Its Reach and Tactics A newly evolved ransomware strain, known as MountLocker, has emerged as a potent threat to corporate networks, demonstrating an alarming ability to evade security software while enabling its affiliates to execute double extortion schemes. First identified in July 2020, MountLocker has rapidly gained…

Read MoreMount Locker Ransomware Introduces Double Extortion Scheme for Fellow Hackers

Extracting Data from Air-Gapped Computers Using Wi-Fi Signals (No Wi-Fi Equipment Required)

A recent breakthrough in cybersecurity research reveals a significant vulnerability within air-gapped systems, which are designed to be isolated from unsecured networks. Researchers have successfully demonstrated a method for exfiltrating sensitive data using a novel attack called AIR-FI. This technique operates by leveraging electromagnetic emissions from the computer’s DDR SDRAM…

Read MoreExtracting Data from Air-Gapped Computers Using Wi-Fi Signals (No Wi-Fi Equipment Required)