Summary: This article discusses the phishing activity targeting Brazil, with a focus on the involvement of threat actors linked to North Korea.

Threat Actor: Threat actors linked to North Korea | North Korea Victim: Brazilian government, aerospace, technology, and financial services sectors | Brazil

Key Point :

Threat actors linked to North Korea have been responsible for one-third of all phishing activity targeting Brazil since 2020.…
Read More

Microsoft has identified a new North Korean threat actor, now tracked as Moonstone Sleet (formerly Storm-1789), that uses both a combination of many tried-and-true techniques used by other North Korean threat actors and unique attack methodologies to target companies for its financial and cyberespionage objectives. Moonstone Sleet is observed to set up fake companies and job opportunities to engage with potential targets, employ trojanized versions of legitimate tools, create a fully functional malicious game, and deliver a new custom ransomware.…

Read More

Summary: This article discusses the importance of making software bills of materials (SBOMs) more easily shareable in order to enhance visibility into enterprise software supply chains and improve security.

Threat Actor: N/A

Victim: N/A

Key Point:

Software bills of materials (SBOMs) are crucial for understanding the components and dependencies of software, enabling better visibility and security in enterprise software supply chains.…
Read More
Preamble

Elastic Security Labs has identified an intrusion set incorporating several malicious modules and leveraging vulnerable drivers to disable known security solutions (EDRs) for crypto mining. Additionally, the team discovered capabilities to establish persistence, install a previously undocumented backdoor, and execute a crypto-miner. We refer to this intrusion set as REF4578 and the primary payload as GHOSTENGINE (tangental research by the team at Antiy has named parts of this intrusion set HIDDENSHOVEL).…

Read More

Summary: Two former MIT students have been indicted for allegedly manipulating the Ethereum blockchain and stealing $25 million worth of cryptocurrency in a “first-of-its-kind” scheme.

Threat Actor: Anton Peraire-Bueno and James Pepaire-Bueno | Anton Peraire-Bueno and James Pepaire-Bueno Victim: Ethereum users | Ethereum

Key Point :

The two former MIT students allegedly used their computer science and math skills to tamper with and manipulate the protocols relied upon by millions of Ethereum users worldwide.…
Read More

Summary: The number of ransomware payments is decreasing, despite the rising number of victims, due to increased cyber resilience, availability of decryptors, and law enforcement actions.

Threat Actor: Ransomware gangs | Ransomware gangs Victim: Organizations | Organizations

Key Point :

The number of ransomware payments is falling, despite the increase in ransomware attacks.…
Read More

Summary: This content discusses the prevalence of recovery fraud in the cryptocurrency space, where victims of crypto scams or cyberattacks are targeted again by individuals or companies claiming to offer recovery services but end up stealing their upfront fees.

Threat Actor: Recovery fraudsters | recovery fraudsters Victim: Individuals who have fallen victim to crypto scams or cyberattacks | crypto scam victims

Key Point :

Recovery fraud, where victims of crypto scams are targeted again by individuals or companies claiming to offer recovery services, is a growing concern in the cryptocurrency space.…
Read More
Introduction

Zscaler ThreatLabz researchers recently encountered a significant number of websites associated with fraudulent activities being hosted on popular web hosting and blogging platforms. Threat actors intentionally create these sites to spread malware by using the proliferation of web hosting platforms to manipulate search engine results – something called SEO poisoning, a subset of Black Hat SEO techniques.…

Read More

Curated bookmark list categorized by area and event monitoring, person of interest search, corporate profiling, mapping, AI, intelligence analysis, reporting tools, collective tools, cryptocurrency, country specific, verification and fact-checking.

They are broken down into appropriate categories such as:

area and event monitoringperson of interest searchcorporate profilingmappingartificial intelligenceintelligence analysisreporting toolscollective toolscryptocurrencycountry specificverification and fact-checking.…
Read More