Summary: The notorious cybercriminal group Smishing Triad is targeting smartphone users in Pakistan with a large-scale smishing campaign aimed at stealing personal and financial information.

Threat Actor: Smishing Triad | Smishing Triad Victim: Smartphone users in Pakistan | Pakistan

Key Point :

The Smishing Triad, originating from China, has been targeting online banking, e-commerce, and payment systems in various regions, including the US, EU, UAE, KSA, and now Pakistan.…
Read More

Summary: A former employee of Singapore-based NCS Group was sentenced to prison for accessing the company’s software test environment and wiping 180 virtual servers after his employment ended.

Threat Actor: Kandula Nagaraju | Kandula Nagaraju Victim: NCS Group | NCS Group

Key Point :

A former employee of NCS Group, Kandula Nagaraju, accessed the company’s software test environment and wiped 180 virtual servers after his employment ended.…
Read More

Hackers often attack online banking platforms, e-commerce portals, and payment systems for illicit purposes.

Resecurity researchers have recently revealed that the Smishing Triad group has launched a fresh smishing campaign targeting Pakistani mobile users.

The gang members send harmful messages pretending to be Pakistan Post via iMessage and SMS in an attempt to steal personal and financial information.…

Read More

Threat Actor: Unknown | Unknown Victim: Cryptocurrency Exchange | Cryptocurrency Exchange Price: $30,000 USD Exfiltrated Data Type: User database, user portfolios, emails, and phone numbers

Additional Information:

The threat actor is offering access to a cryptocurrency exchange’s system administrator panel for $30,000 USD. The access includes RDP via a VPN and provides view-only access to the user database, including user portfolios, emails, and phone numbers.…
Read More

Threat Actor: Unknown | Unknown Victim: Israeli Government | Israeli Government Price: Free Exfiltrated Data Type: Personal information (names, phone numbers, plates, date of birth, address)

Additional Information:

The threat actor uploaded an alleged database of www.gov.il to a dark web forum. The leaked data is from a website used by Israeli citizens for government affairs and bureaucratic tasks.…
Read More

Summary: This article discusses the discovery of 24 vulnerabilities in a biometric access system manufactured by a Chinese company, highlighting the potential security risks associated with biometrics.

Threat Actor: N/A Victim: N/A

Key Point :

A biometric access system manufactured by a Chinese company was found to have 24 vulnerabilities, raising concerns about the security of biometric authentication.…
Read More

Threat Actor: Sp1d3r | Sp1d3r Victim: Cylance | Cylance Price: $750,000 Exfiltrated Data Type: Customer and employee emails, customer/prospect email and PII, products used by organizations, sales prospect list with activity status, Cylance partners list, and users list.

Additional Information:

The stolen data includes 34 million customer and employee emails, customer/prospect email and PII, products used by organizations, sales prospect list with activity status, Cylance partners list, and users list.…
Read More

Threat Actor: Unknown | Unknown Victim: Metro Group of Hospitals | Metro Group of Hospitals Price: Not specified (negotiable) Exfiltrated Data Type: Patient data

Additional Information:

The threat actor claims to have patient data from India’s Metro Group of Hospitals. The database is 379 GB in size and contains approximately 1.5 million records of IPD patient private data and 1.3 million records of OPD patient private data.…
Read More
Introduction

Through the course of our incident response engagements and threat intelligence collections, Mandiant has identified a threat campaign targeting Snowflake customer database instances with the intent of data theft and extortion. Snowflake is a multi-cloud data warehousing platform used to store and analyze large amounts of structured and unstructured data.…

Read More

Summary: A Russian hacktivist crew threatens to attack European internet infrastructure in retaliation for European Parliament-issued sanctions and opposition to the invasion of Ukraine.

Threat Actor: NoName57(16) | NoName57(16) Victim: European Union (EU) | European Union

Key Point :

A Russian hacktivist crew, NoName57(16), along with seven other groups, threatens to launch cyber attacks on European internet infrastructure.…
Read More