Hackers Lures Drone Manual to Deliver Notorious MerlinAgent malware

Securonix Threat Research has found a significant attack called STARK#VORTEX, which appears to come from a group known as UAC-0154. This campaign specifically targets Ukraine’s military, leveraging a cunning tactic involving drone-related lures. Drones have played a pivotal role in Ukraine’s military operations, making them an attractive theme for malicious actors.  The attackers behind UAC-0154 […]

The post Hackers Lures Drone Manual to Deliver Notorious MerlinAgent malware appeared first on Cyber Security News.

EvilBamboo Attacking Android & iOS Devices With Custom Malware

EvilBamboo, formerly known as “Evil Eye,” has been found to target Tibetan, Uyghur, and Taiwanese organizations and individuals. This threat actor was mentioned as conducting custom Android malware campaigns in September 2019. In April 2020, EvilBamboo…

LUCR-3 Attacking Fortune 2000 Companies Using Victims’ Own Tools & Apps

A new financially motivated threat group named “LUCR-3” has been discovered targeting organizations to steal intellectual property for extortion. This threat actor surpasses Scatter Spider, Oktapus, UNC3944, and Storm-0875. LUCR-3 is targeting Fortune …

China Accuses the US of Hacking Huawei Servers Since 2009

Huawei is known for its telecommunications equipment and consumer electronics, including smartphones, and the USA banned Huawei primarily due to national security concerns. As the Chinese government may utilize Huawei’s technology for spying, the…

Bumblebee Malware Abuses WebDAV Protocol to Attack Organizations

In recent cybersecurity news, the notorious Bumblebee loader has made a resurgence in a new campaign, posing a significant threat to organizations’ digital security.  This loader, often used as a stepping stone for ransomware attacks, had ta…

Hackers Attacking Telecoms Servers With HTTPSnoop Malware

In 2022, state-sponsored actors and advanced adversaries consistently targeted telecoms globally, making it a top sector in Talos IR cases. Telecom firms with critical infrastructure assets are prime targets due to their role in national networks and a…