Tag PowerShell

Researchers Reveal Prolonged Cyber Espionage Targeting Foreign Embassies in Belarus

In a troubling revelation, the cyber espionage group codenamed MoustachedBouncer, which has remained undocumented until now, has been linked to a series of attacks targeting foreign embassies in Belarus. ESET security researcher Matthieu Faou notes that this group has likely been active since 2014 and has continuously improved its techniques,…

Read MoreResearchers Reveal Prolonged Cyber Espionage Targeting Foreign Embassies in Belarus

ANY.RUN Uncovers Deceptive Phishing Scheme Leveraging Fake CAPTCHA

Phishing Attack Uncovered Using Fake CAPTCHA to Execute Malicious Scripts In a recent security analysis by ANY.RUN, an interactive malware analysis platform, a sophisticated phishing campaign has been identified that utilizes deceptive fake CAPTCHA prompts to lure victims into executing harmful scripts on their systems. This evolving threat exemplifies the…

Read MoreANY.RUN Uncovers Deceptive Phishing Scheme Leveraging Fake CAPTCHA

North Korean Hackers Collaborate with Play Ransomware in Worldwide Cyber Assault

North Korean State-Sponsored Group Partners with Ransomware Actors in Recent Cyberattack A recent report from Palo Alto Networks’ Unit 42 highlights alarming developments in the cybersecurity landscape, revealing a collaboration between the North Korean state-sponsored threat group known as Jumpy Pisces and the financially motivated Play ransomware group. This incident…

Read MoreNorth Korean Hackers Collaborate with Play Ransomware in Worldwide Cyber Assault

FlyingYeti Leverages WinRAR Vulnerability to Deploy COOKBOX Malware in Ukraine

Cloudflare Disrupts Phishing Campaign Targeting Ukrainian Entities On Thursday, Cloudflare announced that it has taken measures to disrupt an extensive phishing campaign that has been ongoing for a month. This operation is attributed to a Russia-aligned threat actor known as FlyingYeti, which has specifically targeted Ukraine amidst ongoing tensions in…

Read MoreFlyingYeti Leverages WinRAR Vulnerability to Deploy COOKBOX Malware in Ukraine

Active Attacks Targeting OS Command Injection Vulnerability in Oracle WebLogic Server

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) announced on Thursday the inclusion of a significant security vulnerability associated with the Oracle WebLogic Server in its Known Exploited Vulnerabilities (KEV) catalog. This action follows compelling evidence that the flaw is actively being exploited in the wild, raising concerns for organizations…

Read MoreActive Attacks Targeting OS Command Injection Vulnerability in Oracle WebLogic Server

MuddyC2Go: Iranian Hackers Deploy New C2 Framework Targeting Israel

Recent cybersecurity investigations reveal that Iranian state-sponsored actors have employed a novel command-and-control (C2) framework identified as MuddyC2Go. This development is part of ongoing cyber assaults directed at Israel, heightening concerns regarding the threat landscape in the region. Security researcher Simon Kenin from Deep Instinct outlined in a report released…

Read MoreMuddyC2Go: Iranian Hackers Deploy New C2 Framework Targeting Israel

Russian Cyber Espionage Group Unleashes LitterDrifter USB Worm in Coordinated Attacks

Russian state-sponsored cyber espionage activities have recently come under scrutiny as actors associated with the Federal Security Service (FSB) deploy a new malware variant known as LitterDrifter. This USB worm has been specifically used to breach defenses of various entities within Ukraine, raising significant alert levels among cybersecurity experts. Check…

Read MoreRussian Cyber Espionage Group Unleashes LitterDrifter USB Worm in Coordinated Attacks

Experts Caution Against Mekotio Banking Trojan Threatening Latin American Nations

Mekotio Banking Trojan Intensifies Threats Against Latin American Financial Institutions A serious cybersecurity concern has emerged as banks and financial institutions across Latin America face increasing threats from a malware known as Mekotio, also referred to as Melcoz. Recent findings from cybersecurity firm Trend Micro point to a notable rise…

Read MoreExperts Caution Against Mekotio Banking Trojan Threatening Latin American Nations

‘Stargazer Goblin’ Develops 3,000 Phony GitHub Accounts to Distribute Malware

Stargazer Goblin Exploits GitHub for Malware Distribution An ongoing cyber threat has emerged from a group known as Stargazer Goblin, which has established an extensive network of fraudulent GitHub accounts for the distribution of various types of information-stealing malware. Over the past year, this operation is estimated to have generated…

Read More‘Stargazer Goblin’ Develops 3,000 Phony GitHub Accounts to Distribute Malware