Tag Cobalt Strike

Emotet Botnet Makes a Comeback, Infecting Over 100,000 Computers

The Emotet botnet, notorious for its insidious operations, resurged in November 2021 after a significant period of inactivity, accumulating over 100,000 compromised hosts. The botnet’s activities have demonstrated a steady increase, indicating a troubling return to form for this malware. According to researchers from Lumen’s Black Lotus Labs, since its…

Read MoreEmotet Botnet Makes a Comeback, Infecting Over 100,000 Computers

Google Discovers ‘Initial Access Broker’ Collaborating with Conti Ransomware Group

Google’s Threat Analysis Group (TAG) has identified a new initial access broker known as “Exotic Lily,” linked to a notorious Russian cybercrime group famed for its participation in Conti and Diavol ransomware operations. The emergence of this threat actor raises serious concerns regarding cybersecurity practices across multiple sectors. Exotic Lily…

Read MoreGoogle Discovers ‘Initial Access Broker’ Collaborating with Conti Ransomware Group

Hackers are Intensifying Use of ‘Browser-in-the-Browser’ Technique in Attacks Linked to Ukraine

A Belarusian cyber group known as Ghostwriter (also referred to as UNC1151) has been identified exploiting the recently uncovered browser-in-the-browser (BitB) technique in ongoing credential phishing attacks linked to the persistent Russo-Ukrainian conflict. This method employs a deceptive simulation of a browser window that appears legitimate, allowing attackers to execute…

Read MoreHackers are Intensifying Use of ‘Browser-in-the-Browser’ Technique in Attacks Linked to Ukraine

New Incident Report Uncovers Hive Ransomware’s Targeting Tactics against Organizations

A Hive ransomware incident recently targeted an unspecified organization, leveraging vulnerabilities in Microsoft Exchange Server known as “ProxyShell” to conduct a swift attack that culminated in network encryption within 72 hours of initial compromise. This information was shared by Nadav Ovadia, a security researcher from Varonis, in a detailed post-mortem…

Read MoreNew Incident Report Uncovers Hive Ransomware’s Targeting Tactics against Organizations

Russian Hackers Focusing on Diplomatic Targets Across Europe, the Americas, and Asia

A series of sophisticated phishing campaigns targeting diplomatic and governmental organizations has been linked to a Russian-state sponsored hacking group known as APT29, or Cozy Bear. This threat actor has been active since January 17, 2022, employing a range of techniques that highlight their ongoing interest in gathering sensitive diplomatic…

Read MoreRussian Hackers Focusing on Diplomatic Targets Across Europe, the Americas, and Asia

“Override Panda” Hacking Group Emerges Again with New Espionage Operations

In recent weeks, the Chinese state-sponsored hacking group known as Override Panda has made headlines again, launching a sophisticated phishing campaign aimed at acquiring sensitive information. This resurgence focuses on utilizing spear-phishing tactics to compromise targeted entities. According to a report by Cluster25, this threat actor leveraged a spear-phishing email…

Read More“Override Panda” Hacking Group Emerges Again with New Espionage Operations

CISA Alerts on Ongoing Exploits Targeting Trimble Cityworks Vulnerability

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued an alert regarding a critical vulnerability in Trimble’s Cityworks software for geographic information systems (GIS). This vulnerability, identified as CVE-2025-0994, is currently under active exploitation, posing significant risk to its users. CVE-2025-0994 carries a CVSS v4 score of 8.6, indicating…

Read MoreCISA Alerts on Ongoing Exploits Targeting Trimble Cityworks Vulnerability

Chinese Hackers Target T-Mobile and Other U.S. Telecoms in Extensive Espionage Operation

T-Mobile, a prominent U.S. telecommunications provider, has acknowledged being targeted by Chinese cyber threat actors aiming to infiltrate its systems to access sensitive data. The perpetrators, identified as Salt Typhoon, have been conducting a prolonged campaign focusing on extracting cellphone communications of individuals considered “high-value intelligence targets.” The extent of…

Read MoreChinese Hackers Target T-Mobile and Other U.S. Telecoms in Extensive Espionage Operation