Author: Cyble
Keypoints :
Cyble Research and Intelligence Labs (CRIL) analyzed vulnerabilities disclosed between January 8 and 14, 2025.…Keypoints :
HexaLocker was first discovered in mid-2024, with version 2 introducing significant updates.…Summary :
Cyble’s latest Sensor Intelligence report reveals a surge in malware, phishing, and IoT vulnerabilities, highlighting critical threats and vulnerabilities that organizations must address. #CyberThreats #MalwareSurge #IoTVulnerabilitiesKeypoints :
Cyble has identified multiple instances of exploitation attempts, malware intrusions, financial fraud, and brute-force attacks. The report covers various vulnerabilities including high-profile malware variants and CVE attempts.…Summary :
The Romanian National Cyber Security Directorate has issued a critical advisory for the energy sector to scan for LYNX ransomware following a significant attack on the Electrica Group. Proactive measures are essential to mitigate risks and protect sensitive data. #LYNXRansomware #CyberSecurity #EnergySectorKeypoints :
The Romanian National Cyber Security Directorate (DNSC) has issued an advisory for the energy sector.…Summary:
The German CERT has issued a critical warning regarding the exploitation of two vulnerabilities in Palo Alto Networks’ PAN-OS, urging immediate patching to prevent unauthorized access and command execution. These vulnerabilities, CVE-2024-0012 and CVE-2024-9474, pose significant risks to organizations worldwide. The urgency for remediation is heightened as active attacks are already underway.…The article discusses an ongoing cyberattack campaign named “HeptaX,” which utilizes malicious LNK files to initiate a sophisticated multi-stage attack. The campaign heavily relies on PowerShell and BAT scripts to gain unauthorized access to victim systems, create administrative accounts, and lower Remote Desktop authentication requirements.…
The Cybersecurity and Infrastructure Security Agency (CISA) has added Fortinet’s FortiManager to its known Exploited Vulnerabilities (KEV) catalog due to a critical vulnerability (CVE-2024-47575) with a CVSS score of 9.8. This vulnerability allows remote, unauthenticated attackers to execute arbitrary commands or code, posing significant risks to organizations.…
Cyble Research and Intelligence Labs (CRIL) has identified a sophisticated multi-stage malware attack targeting job seekers and digital marketing professionals, particularly those involved with Meta Ads. The attack uses a malicious LNK file to deploy Quasar RAT, employing various evasion techniques to avoid detection and maintain persistence on compromised systems.…
The “ErrorFather” campaign, identified by Cyble Research and Intelligence Labs, utilizes an undetected Cerberus Android Banking Trojan payload. This sophisticated malware employs a multi-stage infection chain, including session-based droppers and encrypted payloads, making detection challenging. The campaign has ramped up since September 2024, showcasing advanced techniques like keylogging, overlay attacks, and a Domain Generation Algorithm (DGA) for resilient command and control operations.…
Cyble Research and Intelligence Labs (CRIL) has discovered a new loader builder named “MisterioLNK,” which is open-source and available on GitHub. This tool allows threat actors to create obfuscated files that evade detection by traditional security systems. MisterioLNK supports multiple scripting formats and obfuscation techniques, making it a significant challenge for cybersecurity defenses.…
Cyble Research and Intelligence Labs (CRIL) uncovered a sophisticated attack that utilizes legitimate tools like Visual Studio Code and GitHub. The attack begins with a disguised .LNK file that downloads a malicious Python script, enabling unauthorized remote access to the victim’s machine through a remote tunnel.…
The Patchwork APT group has launched a sophisticated campaign targeting Chinese entities and Bhutan, utilizing a malicious LNK file to initiate infections. The campaign employs DLL sideloading techniques to execute malware that evades detection and steals sensitive information from compromised systems.
Key Points: Patchwork APT group continues targeting Chinese and Bhutanese entities.…A new Android spyware campaign has been identified targeting individuals in South Korea since June 2024. The spyware uses an Amazon AWS S3 bucket as its Command and Control server and is capable of exfiltrating sensitive data such as SMS messages, contacts, images, and videos.…