-
Microsoft identified a new custom multi-stage backdoor, “Tickler,” deployed by the Iranian state-sponsored threat actor Peach Sandstorm between April and July 2024. Targeting sectors like satellite, communications equipment, oil and g…
ΒΆΒΆΒΆΒΆΒΆ
ΒΆΒΆΒΆΒΆΒΆ
ΒΆΒΆΒΆΒΆΒΆ
-
Researchers from Proofpoint have uncovered a sophisticated cyberattack campaign leveraging Google Sheets as a command and control (C2) platform. Dubbed βVoldemortβ by the researchers, this campaign targets Windows users globally, employing a novel attack chain that combines both common and rare techniques to deliver custom malware. This article delves into the intricacies of the campaign, [β¦] The post Voldemort Threat Actors Abusing Google Sheets to Attack Windows UsersΒ appeared first on GBHackers on Security | #1 Globally Trusted Cyber Security…
ΒΆΒΆΒΆΒΆΒΆ
ΒΆΒΆΒΆΒΆΒΆ
ΒΆΒΆΒΆΒΆΒΆ
-
Windows drivers can be abused to bypass security measures. Attackers can exploit vulnerabilities in legitimate drivers or use stolen or forged digital signatures to load malicious drivers into the operating systemβs kernel. These drivers can then interfere with security software, disabling protections and allowing attackers to gain unauthorized access. To mitigate these risks, Microsoft has [β¦] The post Pootry EDR Killer Malware Wipes Out Security Tools From Windows Machine appeared first on GBHackers on Security | #1 Globally Trusted Cyber…
ΒΆΒΆΒΆΒΆΒΆ
ΒΆΒΆΒΆΒΆΒΆ
ΒΆΒΆΒΆΒΆΒΆ
-
The cyber espionage group Patchwork, also known by various aliases, has been active since 2009, primarily targeting Asian organizations in sectors such as government, military, and industry.Β Based in South Asia, the group has been conducting cyber-espionage campaigns for over a decade, and their activities have focused on compromising sensitive information from their targets, highlighting [β¦] The post Patchwork Actors Using Weaponized Encrypted Zip Files to Attack Orgs appeared first on GBHackers on Security | #1 Globally Trusted Cyber Security…
ΒΆΒΆΒΆΒΆΒΆ
ΒΆΒΆΒΆΒΆΒΆ
ΒΆΒΆΒΆΒΆΒΆ
-
Microsoft 365 users have reported a troubling issue in which email messages containing images are incorrectly flagged as malware and subsequently quarantined. This incident, identified as Issue ID: EX873252, has sparked widespread concern among businesses and individual users who rely on Exchange Online for their daily communications. Incident Overview The problem, categorized as a service [β¦] The post Microsoft 365 Flags Emails with Images as Malware: A Growing Concern for Users appeared first on GBHackers on Security | #1 Globally…
ΒΆΒΆΒΆΒΆΒΆ
ΒΆΒΆΒΆΒΆΒΆ
ΒΆΒΆΒΆΒΆΒΆ
-
Threat actors exploit phishing websites to distribute malware, often posing as well-known product brands on several platforms in order to increase their authenticity. Cyble Research and Intelligence Lab recently found a rather sophisticated phishing campaign that mimicked βWarpVPNβ and distributed custom-tailored malware for Windows, Linux, and macOS. It is an illusory website designed to provide [β¦] The post Cheana Stealer Attacking Windows & macOS VPN Users to Deploy Malware Payloads appeared first on GBHackers on Security | #1 Globally Trusted…
ΒΆΒΆΒΆΒΆΒΆ
ΒΆΒΆΒΆΒΆΒΆ
ΒΆΒΆΒΆΒΆΒΆ
-
Cybersecurity researchers at Aqua Nautilus have uncovered a new malware named PG_MEM that targets PostgreSQL databases. This sophisticated malware employs brute force attacks to gain access, hides within legitimate PostgreSQL processes, and ultimately steals data while mining cryptocurrency. This article delves into the intricate workings of PG_MEM, its attack flow, and its implications for database [β¦] The post PG_MEM β A Malware Hide in Postgres Processes to Steal Data appeared first on GBHackers on Security | #1 Globally Trusted Cyber…
ΒΆΒΆΒΆΒΆΒΆ
ΒΆΒΆΒΆΒΆΒΆ
ΒΆΒΆΒΆΒΆΒΆ
-
Researchers uncovered a new malware campaign dubbed BeaverTail, a North Korean cyber espionage malware family primarily focusing on job seekers. Initially identified as a JavaScript-based info stealer, it has since morphed into a native macOS version that pretends to be legitimate software like the MiroTalk video call service. This malware is designed to steal confidential [β¦] The post BeaverTail Malware Attacking Windows Users Via Weaponized Games appeared first on GBHackers on Security | #1 Globally Trusted Cyber Security News Platform.
ΒΆΒΆΒΆΒΆΒΆ
ΒΆΒΆΒΆΒΆΒΆ
ΒΆΒΆΒΆΒΆΒΆ