Cyber Criminals Exploit GitHub and FileZilla to Deliver Malware Cocktail

A “multi-faceted campaign” has been observed abusing legitimate services like GitHub and FileZilla to deliver an array of stealer malware and banking trojans such as Atomic (aka AMOS), Vidar, Lumma (aka LummaC2), and Octo by impersonating credible software like 1Password, Bartender 5, and Pixelmator Pro. “The presence of multiple malware variants suggests a broad cross-platform […]

Binance’s 4.3 Billion-Dollar Blunder: How cyber criminals launder money via Binance?

Cyber criminals have utilized cryptocurrency exchanges like Binance for money laundering due to the pseudonymous nature of digital currencies. Here’s a general overview of how they might do this: Obtaining Cryptocurrency through Illicit Means: Cyber criminals may acquire cryptocurrencies like Bitcoin through illegal activities such as hacking, ransomware attacks, online scams, or dark web transactions. […]

New Malware Campaign Targets Inexperienced Cyber Criminals with OpenBullet Configs

A new malware campaign has been observed making use of malicious OpenBullet configuration files to target inexperienced cyber criminals with the goal of delivering a remote access trojan (RAT) capable of stealing sensitive information. Bot mitigation company Kasada said the activity is designed to “exploit trusted criminal networks,” describing it as an instance of advanced […]

How cyber criminals are hacking into AWS Fargate, EKS & evading cloudtrail logs detection

Sysdig, a company that specializes in cybersecurity intelligence, uncovered a sophisticated hacking operation known as Scarleteel in February. Since then, Scarleteel has refined both its infection and exfiltration techniques and moved into phase two. Recent operations by Scarleteel have targeted settings such as AWS Fargate and Kubernetes, which indicates a clear shift from just crypto […]

Researchers Warn of Cyber Criminals Using Go-based Aurora Stealer Malware

A nascent Go-based malware known as Aurora Stealer is being increasingly deployed as part of multiple campaigns designed to steal sensitive information from compromised hosts. “These infection chains leveraged phishing pages impersonating download pages of legitimate software, including cryptocurrency wallets or remote access tools, and the 911 method making use of YouTube videos and SEO-poised […]

Gang of 31 cyber criminals arrested for stealing cars via hacking software

In a coordinated operation on October 10 throughout the three nations, 31 people were detained. A total of 22 addresses were raided, and illicit assets worth over EUR 1 098 500 were recovered. The French authorities, working with their Spanish and Latvian counterparts, busted a car theft ring that utilized counterfeit software to steal automobiles […]

Cyber Criminals Using Quantum Builder Sold on Dark Web to Deliver Agent Tesla Malware

A recently discovered malware builder called Quantum Builder is being used to deliver the Agent Tesla remote access trojan (RAT). “This campaign features enhancements and a shift toward LNK (Windows shortcut) files when compared to similar attacks in the past,” Zscaler ThreatLabz researchers Niraj Shivtarkar and Avinash Kumar said in a Tuesday write-up. Sold on […]

Australian Hacker Charged with Creating, Selling Spyware to Cyber Criminals

A 24-year-old Australian national has been charged for his purported role in the creation and sale of spyware for use by domestic violence perpetrators and child sex offenders. Jacob Wayne John Keen, who currently resides at Frankston, Melbourne, is said to have created the remote access trojan (RAT) when he was 15, while also administering […]

Malicious IIS Extensions Gaining Popularity Among Cyber Criminals for Persistent Access

Threat actors are increasingly abusing Internet Information Services (IIS) extensions to backdoor servers as a means of establishing a “durable persistence mechanism.” That’s according to a new warning from the Microsoft 365 Defender Research Team, which said that “IIS backdoors are also harder to detect since they mostly reside in the same directories as legitimate […]

MICROSOFT MAKES THINGS EASIER FOR CYBER CRIMINALS BY ENABLING AGAIN MACROS BY DEFAULT IN OFFICE PRODUCTS

Microsoft has surprised key parts of the security community with its decision to quietly reverse course and allow untrusted macros to open by default in Word and other Office applications. In February, software developer announced significant changes it said were introduced to combat the growing scourge of ransomware and other malware attacks. From now on, […]

24,649,096,027 (24.65 billion) account usernames and passwords have been leaked by cyber criminals till now in 2022

Credential abuse is something that happens only to CEOs or very rich people or employees of fortune 500 companies right? Nope. It’s everywhere, and your compromised passwords and usernames are enabling all kinds of cyber criminals to perform all kinds of account takeover (ATO) attacks.  24,649,096,027 account usernames and passwords have been leaked by cyber-threat […]

How misspelling of one word saved a man his $6 millions from cyber criminals

A businessman nearly lost $6 million to hackers, but one word saved his fortune from falling into accounts of hackers and disappearing forever. The victim was in the final stages of a multi-million dollar property deal when cybercriminals managed to hijack the email address of the other party involved in the deal. They then changed […]

Researchers Detail PureCrypter Loader Cyber Criminals Using to Distribute Malware

Cybersecurity researchers have detailed the workings of a fully-featured malware loader dubbed PureCrypter that’s being purchased by cyber criminals to deliver remote access trojans (RATs) and information stealers. “The loader is a .NET executable obfuscated with SmartAssembly and makes use of compression, encryption, and obfuscation to evade antivirus software products,” Zscaler’s Romain Dumont said in […]

Microsoft makes things harder for cyber criminals by disabling macros by default in Office products

Microsoft has developed multiple protection mechanisms against some popular hacking variants, including the malicious use of macros. Sometimes, threat actors send Office files in which affected users must enable macros to complete the attack, triggering malware download, information theft, and even remote access. Despite protection mechanisms (such as the bar indicating the disabling of macros), […]

New way to steal NFT via Discord used by cyber criminals

At the end of 2021, the Non-Fungible Token (NFT) projects Monkey Kingdom and Fractal were targeted by the same hacking variant, in which electronic fraud was made possible by the abuse of Discord servers associated with these projects. According to the report published by The Verge, in the official channels of these projects suddenly appeared […]

Cyber criminals who helped people cheat and pass CISCO Certifications, CompTIA Certifications, EC- Council certifications arrested. New modus operandi discovered

Authorities in India arrested three individuals accused of participating in a fraudulent operation in order to cheat on the presentation of an exam to obtain certifications from Cisco, E-Council and CompTIA. Those arrested include an engineer who used to work for Delhi. According to the report, online certifications are being offered by a large number […]