Date Reported: 2024-02-17 Country: USA Victim: Otolaryngology Associates (OA) | otolaryn.com Additional Information :

Otolaryngology Associates (OA) was targeted in a cyberattack on February 17, 2024. Although the medical records system was not compromised, it is believed that data may have been exfiltrated. The stolen information includes billing data and, for some individuals, sensitive information such as social security numbers and bank details.…
Read More

Date Reported: 2024-02-28 Country: France (FRA) Victim: Sidaction | sidaction.org Additional Information :

The non-profit organization Sidaction, engaged in the fight against AIDS, has fallen victim to a cyber attack. The attack resulted in a breach of personal data of certain donors, with a risk of disclosure of names, addresses, phone numbers, donation amounts, and IBAN/BIC bank details for approximately 3% of the affected individuals.…
Read More

Threat Actor: Unknown | Unknown Victim: Bank Syariah Indonesia | Bank Syariah Indonesia Price: Free of charge Exfiltrated Data Type: Unauthorized access to employee account of Bank Syariah Indonesia’s cash management system

Additional Information:

The unauthorized access is being offered for an employee account of Bank Syariah Indonesia’s cash management system.…
Read More

Key Points

In early April 2024, ReliaQuest investigated numerous similar incidents targeting customers in the health care sector.We concluded that these intrusions form part of a new campaign targeting health care organizations with the goal of accessing banking information.The attacks used social engineering techniques against help desk staff to bypass account access controls.…
Read More

Threat Actor: Unknown Victim: City of Hope

Key Points: * City of Hope, a renowned cancer research and treatment center, suffered a data breach. * The breach impacted over 827,000 individuals. * Personal and health information of the victims was compromised. * The compromised information included names, contact information, social security numbers, financial details, medical records, and unique identifiers.…

Read More

Key Takeaways

Once again, a fake e-shop campaign has been detected, this time targeting 18 Malaysian banks with upgraded malicious applications. 

The campaign has progressed from its initial focus on Malaysian banks to a broader scope that now encompasses banks in Vietnam and Myanmar. 

The latest version of the malware introduces advanced features such as screen-sharing functionality, the utilization of accessibility services, and intricate communication with command and control servers, signifying an elevated level of sophistication and perseverance. …
Read More

Threat Actor: – Unknowns group – CyberDragon group – Cyber Army of Russia group

Victim: – Government of Slovenia – NLB (largest commercial bank in Slovenia) – Chamber of Commerce and Industry

Information: – The Unknowns group is believed to be behind the series of disruptive DDoS attacks targeting key state websites in Slovenia.…

Read More

Summary: The State Department is warning employees about a fraudulent scheme targeting their payroll accounts, involving phishing and social engineering tactics.

Key Point: 🔒 Cybercriminals are using phishing, email takeovers, and social engineering to redirect employee payroll deposits. 📧 The scheme initially targeted annuity accounts before evolving into phishing attempts for login data.…

Read More

The Brazilian financial sector is facing a formidable cyber threat known as CHAVECLOAK, a banking trojan that has emerged as a significant menace. This sophisticated malware is designed to breach security measures and extract sensitive financial information from potential victims.

An AI illustration of the CHAVECLOAK campaign

The CHAVECLOAK banking trojan primarily affects Microsoft Windows platforms and targets it’s users, especially those residing in Brazil.…

Read More

Malware loaders, critical for deploying malware, enable threat actors to deliver and execute malicious payloads, facilitating criminal activities like data theft and ransomware. Utilizing advanced evasion techniques, loaders bypass security measures and exploit various distribution channels for extensive impact, threat groups enhance their ability to download and execute various malware types as demonstrated by Smoke Loader and GuLoader, highlighting their role in extensive malware distribution.…

Read More

During the month of Ramadan, Resecurity observed a significant increase in fraudulent activities and scams, coinciding with a surge in retail and online transactions. Middle Eastern enterprises, facing this heightened risk, are urged to bolster consumer protection and reinforce their brand security. Notably, in the Kingdom of Saudi Arabia (KSA), consumer spending topped regional charts, exceeding $16 billion.…

Read More