Keypoints :
Research focused on the first generation of MBUX infotainment system.…Author: SecureList
Summary :
BellaCiao is a sophisticated .NET-based malware family linked to the Charming Kitten APT group, featuring unique PDB paths and a C++ variant called BellaCPP. The malware showcases advanced capabilities for stealth and persistence. #BellaCiao #Malware #APT
Keypoints :
BellaCiao is a .NET-based malware family first identified in April 2023.…Summary :
Kaspersky’s GERT team uncovered a cyber incident involving the exploitation of a known Fortinet vulnerability (CVE-2023-48788) leading to unauthorized access and deployment of remote access tools. The incident highlights the importance of timely patching and monitoring of exposed systems. #CyberSecurity #VulnerabilityManagement #IncidentResponse
Keypoints :
Attackers exploited a patched Fortinet vulnerability (CVE-2023-48788) to infiltrate a company’s network.…Summary :
The Lazarus group has escalated its cyberattack strategies through the DeathNote campaign, targeting employees in various sectors with sophisticated malware delivery methods. Recent attacks involved trojanized VNC utilities and a complex infection chain, showcasing their evolving tactics. #LazarusGroup #CyberSecurity #Malware
Keypoints :
The Lazarus group targets employees via fake job opportunities.…Summary :
C.A.S (Cyber Anarchy Squad) is a hacktivist group targeting organizations in Russia and Belarus since 2022, employing various techniques to inflict reputational and financial damage. Their operations involve exploiting vulnerabilities in public services and utilizing free tools, while also collaborating with other hacktivist groups.…
Summary :
A new Android banking Trojan named “Mamont” has been discovered, spreading through deceptive parcel-tracking scams. Victims receive messages prompting them to identify a person in a photo, leading to malware installation. The scam has evolved to target both individuals and businesses with bulk-priced goods, utilizing convincing tactics to lure victims.…
Summary:
In this analysis, we investigate the Ymir ransomware, a new threat identified during an incident response case. The malware employs sophisticated techniques to evade detection and encrypt files, utilizing PowerShell for initial access and executing malicious commands. Our findings highlight the tactics, techniques, and procedures (TTPs) used by the attackers, as well as the implications for cybersecurity defenses.…Summary:
In August 2024, a new crimeware bundle named “SteelFox” was identified, utilizing sophisticated execution chains to spread via forums and torrent sites. It masquerades as legitimate software, extracting sensitive user data and leveraging vulnerabilities in Windows services and drivers for privilege escalation.Keypoints:
SteelFox spreads through malicious forum posts and torrent trackers.…Short Summary:
Attackers are using a fake CAPTCHA as a method to distribute malware, primarily targeting gamers. This campaign, which has expanded to various online resources, delivers the Lumma stealer and the Amadey Trojan through deceptive redirects. The malicious CAPTCHA tricks users into executing harmful commands, leading to data theft and exploitation of online stores.…
Lazarus APT, a sophisticated Korean-speaking threat actor, has been using its backdoor malware Manuscrypt since 2013 in numerous campaigns targeting various sectors. A recent incident involved a zero-day exploit in Google Chrome, which was utilized through a malicious website disguised as a game. This exploit allowed attackers to gain control over victims’ PCs, leading to a significant security breach.…
Grandoreiro is a Brazilian banking trojan that has been active since at least 2016. It enables threat actors to perform fraudulent banking operations by bypassing security measures of financial institutions. Despite law enforcement efforts to disrupt its operations, Grandoreiro continues to evolve and expand its reach globally, targeting thousands of banks and crypto wallets across multiple continents.…
Information stealers are malicious software used to collect sensitive data, particularly credentials, which are then sold on the dark web or used for further cyberattacks. In 2023, nearly 10 million devices were attacked by these stealers. The article discusses several notable stealers, including Kral, AMOS, and Vidar, detailing their methods of operation and the data they target.…
Short Summary:
The article discusses the activities of a new ransomware group dubbed “Crypt Ghouls,” which targets Russian businesses and government agencies. The group employs various tactics, techniques, and procedures (TTPs) similar to other cybercriminal organizations. They utilize tools like Mimikatz, XenAllPasswordPro, and ransomware variants LockBit 3.0 and Babuk to compromise systems and exfiltrate sensitive data.…
The article discusses a new campaign by the APT group Awaken Likho, targeting Russian government agencies and industrial enterprises. The group has shifted its tactics, now utilizing the legitimate MeshCentral platform for remote access instead of the previously used UltraVNC. The campaign, which began in June 2024, involves sophisticated phishing techniques and the deployment of a new implant that enhances the attackers’ ability to maintain control over infected systems.…
The article discusses the critical role of machine learning (ML) in analyzing cybersecurity logs to enhance threat detection capabilities. It highlights Kaspersky’s experience in utilizing ML algorithms, particularly Random Forest, to identify new cyberthreats and indicators of compromise (IoCs) from vast datasets. The challenges of implementing ML in cybersecurity, including dataset preparation and model interpretability, are also addressed.…