Tag ESET

New ComRAT Malware Leverages Gmail for Command Reception and Data Exfiltration

Recent cybersecurity investigations have revealed an upgraded variant of the ComRAT backdoor, a sophisticated tool initially deployed by the Turla Advanced Persistent Threat (APT) group. This latest iteration utilizes Gmail’s web interface to clandestinely receive commands and exfiltrate sensitive information. Cybersecurity firm ESET reported that ComRAT version 4, first identified…

Read MoreNew ComRAT Malware Leverages Gmail for Command Reception and Data Exfiltration

Hackers Impersonate HR Professionals to Target Military and Aerospace Personnel with Fake Job Offers

Targeted Cyber-Espionage Campaign Hits Aerospace and Military Sectors Cybersecurity researchers have unveiled a sophisticated cyber-espionage campaign that specifically targets aerospace and military organizations across Europe and the Middle East. This initiative, termed “Operation In(ter)ception,” reportedly aimed to infiltrate and monitor key personnel within these firms while also attempting to extract…

Read MoreHackers Impersonate HR Professionals to Target Military and Aerospace Personnel with Fake Job Offers

A Google Drive Vulnerability Could Enable Attackers to Coerce You into Installing Malware

A recently uncovered vulnerability in Google Drive presents a significant risk, potentially allowing cybercriminals to distribute malware disguised as legitimate files. This largely unaddressed security oversight enables attackers to leverage Google Drive’s file version management feature, resulting in higher success rates for spear-phishing schemes. The flaw, which Google is reportedly…

Read MoreA Google Drive Vulnerability Could Enable Attackers to Coerce You into Installing Malware

New ModPipe POS Malware Alert: Targeting Restaurants and Hotels

Cybersecurity researchers have recently unveiled a new modular backdoor malware named “ModPipe,” targeting Oracle’s point-of-sale (POS) restaurant management software with the intent of stealing sensitive payment information. The discovery highlights a growing trend in cyber threats towards payment processing systems where attackers exploit vulnerabilities to access critical data. ModPipe specifically…

Read MoreNew ModPipe POS Malware Alert: Targeting Restaurants and Hotels

Experts Discover ‘Crutch’ Russian Malware Deployed in APT Attacks for Five Years

In a significant revelation, cybersecurity researchers have exposed a sophisticated backdoor and document-stealing malware that operated undetected from 2015 to early 2020. Dubbed “Crutch” by ESET, this malware has been linked to the notorious Turla group, a Russia-based advanced persistent threat (APT) known for targeting governments, embassies, and military institutions…

Read MoreExperts Discover ‘Crutch’ Russian Malware Deployed in APT Attacks for Five Years

Vietnam Government Certification Authority Targeted by Software Supply Chain Attack

Recent reports reveal a sophisticated supply-chain attack targeting the Vietnam Government Certification Authority (VGCA). This breach involved the manipulation of the agency’s digital signature toolkit, allowing hackers to implant a backdoor into affected systems. The incident was brought to light by Slovak cybersecurity firm ESET, which identified the assault, referred…

Read MoreVietnam Government Certification Authority Targeted by Software Supply Chain Attack

Russian-Linked Hackers Exploit Roundcube Vulnerabilities to Target Over 80 Organizations

A recent report by Recorded Future has revealed a sophisticated cyber espionage campaign attributed to threat actors with ties to Belarus and Russia. This operation has reportedly taken advantage of cross-site scripting (XSS) vulnerabilities in Roundcube webmail servers, targeting over 80 organizations predominantly based in Georgia, Poland, and Ukraine. The…

Read MoreRussian-Linked Hackers Exploit Roundcube Vulnerabilities to Target Over 80 Organizations

Iranian Hackers Draw Motivation from Snake Video Game

MuddyWater Utilizes Game Delay Tactic for Malware Deployment David Perera (@daveperera) • December 2, 2025 Image: Larisa Potekhina/Shutterstock Recent analyses by cybersecurity researchers reveal that Iranian state-sponsored hackers have adopted a unique method to hide malware, drawing parallels with the classic mobile game Snake. These findings indicate that hackers have…

Read MoreIranian Hackers Draw Motivation from Snake Video Game