### #LummAppThreat #AdwareAttack #InfoStealerCampaign

Summary: The “LummApp” threat campaign, identified by Team Axon in October 2024, employs advanced adware and infostealing techniques to compromise users and organizations by masquerading as a legitimate application. This campaign utilizes sophisticated methods to exfiltrate sensitive data while evading detection.

Threat Actor: Team Axon | Team Axon Victim: Various users and organizations | users and organizations

Key Point :

Disguised as benign software, LummApp is distributed via ZIP files containing MSI installers that deploy malicious browser extensions.…
Read More
https://www.hendryadrian.com/dashboard/query.php?x=indonesia

In recent years, Indonesia has seen a significant surge in cybersecurity incidents, ranging from ransomware attacks to data breaches targeting both government and private sector organizations. These incidents not only expose organizational vulnerabilities but also jeopardize sensitive personal and business information, underscoring the pressing need for robust cybersecurity strategies.…

Read More

Video Summary and Key Points

Summary

The video discusses recent investigations into TP Link routers by three US Federal departments, highlighting concerns about security vulnerabilities that may enable cyber-attacks by foreign governments, particularly China. The implications of potential regulatory actions against TP Link, which dominates the US router market, are examined, along with insights into other cybersecurity issues, such as SS7 network vulnerabilities and a new phishing scam affecting Ledger crypto wallet users.…

Read More

Summary :

Silent Push Threat Analysts have identified a significant phishing campaign led by a threat actor known as “Aggressive Inventory Zombies” (AIZ), targeting major retail brands and cryptocurrency platforms. This campaign utilizes sophisticated phishing websites and chat services to deceive users. #Phishing #CyberThreats #EcommerceSecurity

Keypoints :

Threat actor “Aggressive Inventory Zombies” (AIZ) has ramped up phishing activities in 2024.…
Read More

### #LazarusGroup #CookiePlus #OperationDreamJob

Summary: The Lazarus Group has been observed executing sophisticated cyber espionage tactics against a nuclear-related organization, deploying a new backdoor known as CookiePlus. This campaign is part of a broader initiative targeting various sectors through deceptive job opportunities to facilitate malware deployment.…

Read More

### #CodeCompromise #SupplyChainThreats #DeveloperSecurity

Summary: Malicious Visual Studio Code extensions have been identified on the VSCode marketplace, targeting developers and cryptocurrency projects through supply chain attacks. These extensions download heavily obfuscated PowerShell payloads, posing significant risks to users.

Threat Actor: Unknown | Unknown Victim: Developers and Cryptocurrency Projects | Developers and Cryptocurrency Projects

Key Point :

18 malicious VSCode extensions were discovered, primarily targeting cryptocurrency investors and productivity tool users.…
Read More

### #DiicotThreatGroup #LinuxMalware #CloudSecurity

Summary: A new malware campaign attributed to the Romanian-speaking Diicot threat group targets Linux systems, showcasing advanced techniques and a focus on cloud environments. This campaign reflects the group’s evolution, learning from past research to enhance their malware’s sophistication and effectiveness.

Threat Actor: Diicot | Diicot Victim: Various Linux systems | Linux systems

Key Point :

Targets Linux systems, particularly those running OpenSSH, exploiting weak credentials.…
Read More

As Malaysia continues to advance as a digital economy and a technological hub in Southeast Asia, the cybersecurity landscape presents significant challenges. Recent incidents highlight vulnerabilities across various sectors, emphasizing the need for robust protective measures against the rising tide of cybercrime.

https://www.hendryadrian.com/dashboard/query.php?x=malaysia Dismantling of Rydox: A Major Cybercrime Marketplace

A significant blow to online cybercriminal activities was dealt with the dismantling of Rydox, an illicit marketplace notorious for selling stolen personal information and a range of cybercrime tools.…

Read More

As a rising hub for finance, technology, and international enterprise, Singapore’s cybersecurity landscape is becoming increasingly complex and requires close scrutiny. Recent incidents underscore the urgent need for enhanced vigilance and proactive measures to safeguard sensitive data and infrastructures against myriad cyber threats.

https://www.hendryadrian.com/dashboard/query.php?x=singapore The Upsurge in Phishing and Ransomware Attacks

The region has witnessed a significant rise in phishing and ransomware attacks.…

Read More

Victim: PT Pertamina Country : ID Actor: killsec Source: http://ks5424y3wpr5zlug5c7i6svvxweinhbdcqcfnptkfcutrncfazzgz5id.onion/?pid=hYZKeEDmdoH3aHUPi7njvK9h Discovered: 2024-12-20 13:24:53.567651 Published: 2024-12-20 13:24:52.596427

Description : N/A

Ransomware Victims – ALL Other Victims by killsec

Ransomware Landscape in Indonesia

Ransomware Landscape in Indonesia Victim: PT Pertamina State-owned oil and natural gas corporation in Indonesia.…
Read More

Summary :

In 2024, law enforcement agencies worldwide have made significant strides against cybercrime through international collaboration and intelligence sharing, leading to the dismantling of major criminal operations and marketplaces. #Cybercrime #LawEnforcement #InternationalCollaboration

Keypoints :

International operations have disrupted various cybercrime networks in 2024. Law enforcement agencies collaborated to dismantle ransomware groups and Dark Web marketplaces.…
Read More

Summary :

2024 was marked by significant cyber threats, including the emergence of LLMjacking, automated attacks, and the abuse of open source tools. As we move into 2025, organizations must adapt their cybersecurity strategies to address these evolving risks. #CyberSecurity #LLMjacking #ThreatTrends

Keypoints :

LLMjacking emerged as a significant threat, costing organizations over $100,000 daily.…
Read More

Summary :

ReversingLabs researchers have identified a rising trend of malicious activities targeting the VSCode Marketplace, particularly through npm packages. This shift highlights the vulnerability of development environments and the need for stringent security measures to prevent supply chain attacks. #Malware #SupplyChainAttack #CyberSecurity

Keypoints :

ReversingLabs has expanded its threat hunting to the VSCode Marketplace, revealing increasing malicious activities.…
Read More

Video Summary Video Summary

The video discusses a decentralized exchange, highlighting its features, functionality, and benefits for users in the crypto space.

Key Points The concept of decentralized exchanges (DEX) and how they differ from traditional exchanges. Benefits of using a DEX, including enhanced security and privacy for users.…
Read More

Wiz Research has uncovered a sophisticated malware campaign attributed to the Romanian-speaking Diicot threat group, targeting Linux systems. This campaign demonstrates significant advancements in malware capabilities, including self-propagating tools and refined evasion techniques. The group’s tactics reflect a learning process from prior research, posing a serious threat to various sectors.…
Read More

Summary :

Threat actors known as “Aggressive Inventory Zombies” (AIZ) have been conducting large-scale phishing campaigns targeting major retailers and crypto audiences throughout 2024, utilizing sophisticated methods and tools. #PhishingCampaigns #RetailScams #CryptoFraud

Keypoints :

AIZ has ramped up phishing activities targeting major retailers and crypto audiences in 2024.…
Read More

### #OperationPowerOFF #DDoSCrackdown #CybercrimeInitiative

Summary: Law enforcement from 15 countries has successfully dismantled 27 DDoS-for-hire services as part of ‘Operation PowerOFF,’ resulting in multiple arrests and the identification of numerous customers. This coordinated effort aims to combat the growing threat of DDoS attacks, particularly during peak online shopping seasons.…

Read More