Keypoints :
Large-scale DDoS attacks monitored since the end of 2024.…Author: TrendMicro
Keypoints :
Attackers abused the IIS worker to upload a web shell.…Keypoints :
Attackers exploit user trust by using platforms like YouTube to share fake installer links.…Keypoints :
Two critical LDAP vulnerabilities were patched by Microsoft in December 2024.…Summary :
The latest variant of NodeStealer has evolved into a sophisticated Python-based malware that targets sensitive data, including Facebook Ads Manager accounts. Delivered through spear-phishing attacks, this malware employs advanced techniques to exfiltrate data via Telegram. #NodeStealer #Cybersecurity #Malware
Keypoints :
NodeStealer has transitioned from JavaScript to Python, enhancing its data theft capabilities.…Summary :
Earth Koshchei, an APT group allegedly sponsored by the SVR, executed a sophisticated rogue RDP campaign targeting high-profile sectors through spear-phishing emails and advanced anonymization techniques, resulting in potential data breaches and malware installations. #EarthKoshchei #RDPattack #CyberEspionage
Keypoints :
Earth Koshchei utilized a rogue RDP attack methodology involving RDP relays and configuration files to gain control of targeted machines.…Summary :
A social engineering attack via Microsoft Teams led to the installation of DarkGate malware, allowing attackers to gain remote access and execute malicious commands. #SocialEngineering #DarkGateMalware #CyberSecurity
Keypoints :
The attacker impersonated a client during a Microsoft Teams call to manipulate the victim into downloading AnyDesk.…Summary:
LODEINFO is a malware utilized by the Earth Kasha group, primarily targeting Japan since 2019. Recent campaigns have revealed significant updates in their tactics, techniques, and procedures, expanding their targets to Taiwan and India. The group employs various backdoors, including LODEINFO and NOOPDOOR, and exploits vulnerabilities in public-facing applications for initial access.…Summary:
Water Barghest has developed a botnet of over 20,000 IoT devices by October 2024, exploiting vulnerabilities to monetize these devices through automated scripts and the Ngioweb malware. The entire process from infection to proxy availability can occur in as little as 10 minutes, highlighting the efficiency of their operations.…Summary:
Earth Estries employs sophisticated attack chains utilizing various malware, including Zingdoor and Snappybee, to exploit vulnerabilities in systems like Microsoft Exchange servers. Their tactics involve maintaining persistence, lateral movement, and data exfiltration through a combination of custom tools and established malware.Keypoints:
Earth Estries targets government and tech sectors since at least 2020.…Short Summary:
This article discusses the prevalence of cyberattacks utilizing web shells and VPN compromises, emphasizing the need for behavioral analysis and anomaly detection in cybersecurity measures. It highlights two case studies analyzed by Trend Micro MXDR, detailing the attack chains, methods used by attackers, and recommendations for organizations to enhance their security posture.…
This article discusses a Golang ransomware that exploits AWS S3 for data theft while masquerading as LockBit to intimidate victims. The discovery of hard-coded AWS credentials in the ransomware samples led to the suspension of the associated AWS accounts.
Key Points Golang ransomware samples utilize AWS S3 Transfer Acceleration to exfiltrate files to attacker-controlled buckets.…