Tag PowerShell

Citrix NetScaler Warning: Ransomware Attackers Targeting Critical Vulnerability

Unpatched Citrix NetScaler Systems Targeted in Suspected Ransomware Attack Recent developments in cybersecurity have revealed that unpatched Citrix NetScaler systems facing the internet are being exploited by unidentified threat actors, likely in the context of a ransomware operation. Cybersecurity firm Sophos has identified this activity cluster as STAC4663, which is…

Read MoreCitrix NetScaler Warning: Ransomware Attackers Targeting Critical Vulnerability

GandCrab Ransomware and Ursnif Virus Distributing Through MS Word Macros

Security researchers have identified two distinct malware campaigns targeting systems through phishing strategies, one distributing both the Ursnif data-stealing trojan and GandCrab ransomware, while the other focuses solely on Ursnif. These threats originate from two separate cybercriminal groups but exhibit several operational similarities. Both campaigns initiate through phishing emails containing…

Read MoreGandCrab Ransomware and Ursnif Virus Distributing Through MS Word Macros

Pro-Russian Hackers Target Recent WinRAR Vulnerability in Latest Attack Campaign

Recent reports indicate that pro-Russian hacking groups are exploiting a security vulnerability in WinRAR, a widely used archiving software. This vulnerability has been employed in a phishing campaign aimed at credential theft from compromised systems, raising significant security concerns among business owners. The vulnerability in question, known as CVE-2023-38831, affects…

Read MorePro-Russian Hackers Target Recent WinRAR Vulnerability in Latest Attack Campaign

An Insight into Ongoing Chinese Hacking Initiatives Against Foreign Governments

Chinese Hacking Group Rancor Targets Southeast Asian Governments with Advanced Phishing Campaign Phishing remains a prominent tactic employed by cybercriminals and espionage organizations to infiltrate target systems. Despite advancements in threat detection and increased public awareness over the past decade, sophisticated phishing attacks continue to pose a significant risk to…

Read MoreAn Insight into Ongoing Chinese Hacking Initiatives Against Foreign Governments

Russian Hackers Attack Anti-Doping Agencies Before the 2020 Tokyo Olympics

As Japan prepares for the 2020 Summer Olympics in Tokyo, concerns are escalating regarding potential sophisticated cyberattacks from state-sponsored hackers. Microsoft has issued a warning about a recent surge in targeted attacks attributed to a group of Russian state-sponsored hackers, known as Strontium, or more widely recognized as Fancy Bear…

Read MoreRussian Hackers Attack Anti-Doping Agencies Before the 2020 Tokyo Olympics

First Cyber Attack Utilizing BlueKeep RDP Vulnerability Discovered in the Wild

Cybersecurity Alert: Initial Exploitation of BlueKeep Vulnerability Aimed at Cryptocurrency Mining Cybersecurity experts have identified what appears to be an amateur attempt to exploit the notorious BlueKeep vulnerability, which affects Microsoft’s Remote Desktop Protocol (RDP). This new cyberattack attempts to compromise vulnerable systems for the purpose of cryptocurrency mining, particularly…

Read MoreFirst Cyber Attack Utilizing BlueKeep RDP Vulnerability Discovered in the Wild

New Zeppelin Ransomware Aiming at Tech and Healthcare Firms

A new variant of the Vega ransomware family, designated as Zeppelin, has recently emerged, specifically targeting technology and healthcare sectors across Europe, the United States, and Canada. This development raises significant concerns in the cybersecurity community, especially for organizations reliant on technology infrastructure and sensitive data handling. Interestingly, Zeppelin appears…

Read MoreNew Zeppelin Ransomware Aiming at Tech and Healthcare Firms

UAC-0099: Leveraging WinRAR Vulnerabilities to Attack Ukrainian Companies with LONEPAGE Malware

The threat actor identified as UAC-0099 has intensified its campaign targeting Ukraine, utilizing a critical vulnerability in the WinRAR software to distribute the malware variant known as LONEPAGE. This method highlights a significant shift in tactics, emphasizing the exploitation of existing software vulnerabilities to facilitate attacks. According to cybersecurity firm…

Read MoreUAC-0099: Leveraging WinRAR Vulnerabilities to Attack Ukrainian Companies with LONEPAGE Malware

Researchers Capitalized on an Emotet Vulnerability to Halt Malware Spread

Emotet Malware: A Case Study in Cybersecurity Countermeasures In a notable development in cybersecurity, research into the Emotet malware—a widely recognized email-based threat responsible for numerous botnet-driven spam and ransomware assaults—has revealed a significant vulnerability. Cybersecurity experts were able to exploit this flaw to implement a temporary kill-switch, effectively halting…

Read MoreResearchers Capitalized on an Emotet Vulnerability to Halt Malware Spread