Tag: malware deployment
-
Microsoft Security Blog: Threat actors leverage tax season to deploy tax-themed phishing campaigns
Source URL: https://www.microsoft.com/en-us/security/blog/2025/04/03/threat-actors-leverage-tax-season-to-deploy-tax-themed-phishing-campaigns/ Source: Microsoft Security Blog Title: Threat actors leverage tax season to deploy tax-themed phishing campaigns Feedly Summary: As Tax Day approaches in the United States on April 15, Microsoft has detected several tax-themed phishing campaigns employing various tactics. These campaigns use malicious hyperlinks and attachments to deliver credential phishing and malware including…
-
Cloud Blog: Suspected China-Nexus Threat Actor Actively Exploiting Critical Ivanti Connect Secure Vulnerability (CVE-2025-22457)
Source URL: https://cloud.google.com/blog/topics/threat-intelligence/china-nexus-exploiting-critical-ivanti-vulnerability/ Source: Cloud Blog Title: Suspected China-Nexus Threat Actor Actively Exploiting Critical Ivanti Connect Secure Vulnerability (CVE-2025-22457) Feedly Summary: Written by: John Wolfram, Michael Edie, Jacob Thompson, Matt Lin, Josh Murchie On Thursday, April 3, 2025, Ivanti disclosed a critical security vulnerability, CVE-2025-22457, impacting Ivanti Connect Secure (“ICS”) VPN appliances version 22.7R2.5 and…
-
Krebs on Security: ClickFix: How to Infect Your PC in Three Easy Steps
Source URL: https://krebsonsecurity.com/2025/03/clickfix-how-to-infect-your-pc-in-three-easy-steps/ Source: Krebs on Security Title: ClickFix: How to Infect Your PC in Three Easy Steps Feedly Summary: A clever malware deployment scheme first spotted in targeted attacks last year has now gone mainstream. In this scam, dubbed “ClickFix," the visitor to a hacked or malicious website is asked to distinguish themselves from…
-
Microsoft Security Blog: Malvertising campaign leads to info stealers hosted on GitHub
Source URL: https://www.microsoft.com/en-us/security/blog/2025/03/06/malvertising-campaign-leads-to-info-stealers-hosted-on-github/ Source: Microsoft Security Blog Title: Malvertising campaign leads to info stealers hosted on GitHub Feedly Summary: Microsoft detected a large-scale malvertising campaign in early December 2024 that impacted nearly one million devices globally. The attack originated from illegal streaming websites embedded with malvertising redirectors and ultimately redirected users to GitHub to deliver…
-
Hacker News: SEAL Advisory on DPRK Threat to Crypto Exchanges
Source URL: https://www.securityalliance.org/news/2025-02-dprk-advisory Source: Hacker News Title: SEAL Advisory on DPRK Threat to Crypto Exchanges Feedly Summary: Comments AI Summary and Description: Yes Summary: The text describes a significant cyber theft by DPRK operatives, detailing their sophisticated tactics for compromising crypto exchanges. It emphasizes the importance of internal reviews and specific security measures for exchanges…
-
The Register: Japanese Police claim China ran five-year cyberattack campaign
Source URL: https://www.theregister.com/2025/01/09/japan_mirrorface_china_attack/ Source: The Register Title: Japanese Police claim China ran five-year cyberattack campaign Feedly Summary: ‘MirrorFace’ group found ways to run malware in the Windows sandbox, which is worrying Japan’s National Police Agency and Center of Incident Readiness and Strategy for Cybersecurity have confirmed third party reports of attacks on local orgs by…
-
Cloud Blog: Ivanti Connect Secure VPN Targeted in New Zero-Day Exploitation
Source URL: https://cloud.google.com/blog/topics/threat-intelligence/ivanti-connect-secure-vpn-zero-day/ Source: Cloud Blog Title: Ivanti Connect Secure VPN Targeted in New Zero-Day Exploitation Feedly Summary: Written by: John Wolfram, Josh Murchie, Matt Lin, Daniel Ainsworth, Robert Wallace, Dimiter Andonov, Dhanesh Kizhakkinan, Jacob Thompson Note: This is a developing campaign under active analysis by Mandiant and Ivanti. We will continue to add more…
-
Hacker News: New ‘OtterCookie’ malware used to backdoor devs in fake job offers
Source URL: https://www.bleepingcomputer.com/news/security/new-ottercookie-malware-used-to-backdoor-devs-in-fake-job-offers/ Source: Hacker News Title: New ‘OtterCookie’ malware used to backdoor devs in fake job offers Feedly Summary: Comments AI Summary and Description: Yes Summary: The text outlines a cybersecurity threat posed by North Korean actors using new malware called OtterCookie in a campaign targeting software developers through fake job offers. It highlights…
-
Threat Research Archives – Unit 42: Fighting Ursa Luring Targets With Car for Sale
Source URL: https://unit42.paloaltonetworks.com/fighting-ursa-car-for-sale-phishing-lure/ Source: Threat Research Archives – Unit 42 Title: Fighting Ursa Luring Targets With Car for Sale Feedly Summary: AI Summary and Description: Yes Summary: The text presents a detailed account of a sophisticated cybersecurity threat from the Russian group Fighting Ursa, which targeted diplomats using a phishing campaign disguised as a car…
-
The Register: Iran-linked crew used custom ‘cyberweapon’ in US critical infrastructure attacks
Source URL: https://www.theregister.com/2024/12/13/iran_cyberweapon_us_attacks/ Source: The Register Title: Iran-linked crew used custom ‘cyberweapon’ in US critical infrastructure attacks Feedly Summary: IOCONTROL targets IoT and OT devices from a ton of makers, apparently An Iranian government-linked cybercriminal crew used custom malware called IOCONTROL to attack and remotely control US and Israel-based water and fuel management systems, according…