The Anatomy of a Threat: Insights from an Analyst
Cyberattacks are increasingly targeting various entities including managed service providers, businesses, and home users. Understanding the stages of these attacks, which range from reconnaissance to control, is essential for strengthening cybersecurity defenses. Threat intelligence plays a crucial role in helping organizations prepare for and respond to these threats effectively.…
Read More

Victim: www.fgse.cu.edu.eg Country : EG Actor: GDLockerSec Source: http://igziys7pres4644kbrtakxfbrwkyld64nxk5prpkgtcexwrrjgtfjzyd.onion/304bddb7-1ae9-48d1-b5d1-370e4a308575/ Discovered: 2025-01-26 19:29:25.544312 Published: 2025-01-26 19:28:20.980167 Description : Data size: 7MB Format: The content may be in various formats such as text, images, audio, or video. Compression: File size can often be reduced using compression techniques. Transfer: 7MB is generally manageable for transfer over standard internet connections.…
Read More
US House Committee calls for offensive cyber strategies in response to rising adversarial threats – Industrial Cyber
Summary: The U.S. House Committee on Homeland Security recently held a hearing to address escalating cybersecurity threats, emphasizing the need for an offensive strategy against increasingly sophisticated adversaries. Testimonies from cybersecurity experts highlighted the growing intrusions from nation-state actors like China, Russia, Iran, and North Korea, as well as the rising threat from cybercriminal organizations.…
Read More

Victim: Keepz Country : GE Actor: killsec Source: http://ks5424y3wpr5zlug5c7i6svvxweinhbdcqcfnptkfcutrncfazzgz5id.onion/?pid=30HIAZz0dL7nKyEhVKBLBD53 Discovered: 2025-01-25 19:45:23.480750 Published: 2025-01-25 19:45:23.480750 Description : Cutting-edge digital payment solution provider Based in Tbilisi, Georgia Offers innovative tools for businesses Streamlines transaction processes Flagship product: QR-based payment system Enables businesses to accept payments without physical terminals No user registration required for payments

About Country GE (Georgia)

– Cybersecurity Landscape: Georgia has been progressively enhancing its cybersecurity framework to protect critical infrastructure and citizens from cyber threats.…

Read More

Victim: Jan Nygaard Country : DK Actor: dragonforce Source: http://z3wqggtxft7id3ibr7srivv5gjof5fwg76slewnzwwakjuf3nlhukdid.onion/blog/?post_uuid=d01a1791-f858-42d2-a84e-291664e49978 Discovered: 2025-01-25 21:27:47.271909 Published: 2025-01-25 21:26:42.497656 Description : Company Name: Jan Nygaard As Industry: Industrial Machinery & Equipment Employee Count: 100 to 249 people Revenue: 10M to 25M Headquarters: Glostrup, Capital Region, Denmark

About Country DK (Denmark)

– Cybersecurity Infrastructure: Denmark has a robust cybersecurity framework, governed by the Danish Agency for Cyber and Critical Information Infrastructure (DCI).…

Read More

Victim: nutripack.eu Country : FR Actor: safepay Source: http://nz4z6ruzcekriti5cjjiiylzvrmysyqwibxztk6voem4trtx7gstpjid.onion#nutripack Discovered: 2025-01-25 20:30:47.878358 Published: 2025-01-25 20:30:47.878358 Description : Nutripack.eu is an international company based in Europe. Specializes in manufacturing and sales of sustainable food packaging. Offers innovative, eco-friendly solutions including recyclable trays and biodegradable options. Established with the goal of reducing plastic wastage.…
Read More
No Honour Among Thieves: Uncovering a Trojanized XWorm RAT Builder Propagated by Threat Actors and Disrupting Its Operations
A trojanized version of the XWorm RAT builder has been weaponized and disseminated primarily through GitHub and other file-sharing services, targeting novice users in cybersecurity. The malware has compromised over 18,459 devices globally, exfiltrating sensitive data and utilizing Telegram for command-and-control operations. Disruption efforts have been made to mitigate its impact, but challenges remain due to offline devices and rate-limiting on Telegram.…
Read More
Cybersecurity News Review, Week 4 (2025)
This week’s cybersecurity overview includes critical vulnerabilities in various software and hardware, exploits of chained vulnerabilities, record-high DDoS attacks, and a notable ransomware surge, particularly impacting education and utilities. The article emphasizes the necessity for improved security measures across affected sectors. Affected: 7-Zip, Asus, Ivanti Cloud Service Appliances, Cisco, Cambium Networks, ABB, UK Education Sector, PowerSchool, US Utilities, Russia, Iran

Keypoints :

7-Zip has a critical vulnerability (CVE-2025–0411) that allows code execution by bypassing the Mark of the Web security feature.…
Read More

Attacker: MrBrew1337Target: https://pt-kaltara.go.idSource: http://www.zone-h.org/mirror/id/41316190

Attacker: ./OutsidersTarget: rdm.mtsn1banyumas.sch.id/wle.t…Source: https://zone-xsec.com/mirror/id/703475

Attacker: ./OutsidersTarget: ppdb.mtsn1banyumas.sch.id/wle….Source: https://zone-xsec.com/mirror/id/703474

Attacker: ./OutsidersTarget: elearning.mtsn1banyumas.sch.id…Source: https://zone-xsec.com/mirror/id/703473

Attacker: ./OutsidersTarget: mtsn1banyumas.sch.id/wle.txtSource: https://zone-xsec.com/mirror/id/703472

Attacker: fitwilliamx12Target: kmews.drmc.gov.et/12.htmlSource: https://zone-xsec.com/mirror/id/703465

Attacker: MrBrew1337Target: antrian.pt-kaltara.go.idSource: https://zone-xsec.com/mirror/id/703464

Attacker: MrBrew1337Target: eseksi.pt-kaltara.go.idSource: https://zone-xsec.com/mirror/id/703463

Attacker: MrBrew1337Target: pt-kaltara.go.idSource: https://zone-xsec.com/mirror/id/703462

Attacker: Cynn7Target: lomsak.go.th/headimg/0x.htmlSource: https://zone-xsec.com/mirror/id/703460

Attacker: M4K10 R0YTarget: bayanadraga.khe.gov.mn/upload/…Source: https://zone-xsec.com/mirror/id/703458

Attacker: M4K10 R0YTarget: www.mlsp.gov.mn/home01/mlspgov…Source:…

Read More
UnitedHealth updates number of data breach victims to 190 million
Summary: The ransomware attack on Change Healthcare has now impacted nearly 200 million individuals, significantly more than previously reported. UnitedHealth, the parent company, has confirmed that sensitive personal and health information was accessed, including Social Security numbers and medical records. The company is still assessing the full extent of the breach and has begun notifying affected individuals.…
Read More
Arctic Wolf Observes Campaign Exploiting SimpleHelp RMM Software for Initial Access – Arctic Wolf
On January 22, 2025, Arctic Wolf observed a campaign exploiting vulnerabilities in SimpleHelp RMM software for unauthorized access. Several serious vulnerabilities had been disclosed just prior, potentially allowing attackers to leverage administrative privileges. While it’s uncertain if these vulnerabilities are responsible, Arctic Wolf urges users to upgrade their software to mitigate risks.…
Read More
Arctic Wolf Observes Campaign Exploiting SimpleHelp RMM Software for Initial Access – Arctic Wolf
A recent campaign has been observed targeting devices running SimpleHelp RMM software, exploiting newly disclosed vulnerabilities. Arctic Wolf recommends upgrading SimpleHelp server software and uninstalling unused clients to mitigate risks. The threat actors could potentially gain administrative access, facilitating broader intrusions. Affected: SimpleHelp RMM software, organizations using SimpleHelp

Keypoints :

Campaign observed involving unauthorized access via SimpleHelp RMM software.…
Read More
Burp Suite Other Modules Thm
The article provides an in-depth overview of the Burp Suite’s lesser-known modules, focusing on the Decoder, Comparer, Sequencer, and Organizer tools. Each tool serves a unique function: the Decoder for encoding/decoding data, the Comparer for data comparison, the Sequencer for evaluating token randomness, and the Organizer for managing HTTP requests for future reference.…
Read More

Victim: aws.amazon.com | 8 btc Country : US Actor: GDLockerSec Source: http://igziys7pres4644kbrtakxfbrwkyld64nxk5prpkgtcexwrrjgtfjzyd.onion/294bddb7-1ae9-48d1-b5d1-370e4a308575/ Discovered: 2025-01-25 02:33:35.659864 Published: 2025-01-25 02:32:29.930073 Description : Data storage capacity: 9GB

About Country: US

– Cybersecurity Framework: The US has a robust cybersecurity framework led by agencies such as the Cybersecurity and Infrastructure Security Agency (CISA), which promotes a coordinated national response to cyber threats.…

Read More
Fortify Your APIs: How BeVigil Secured a Logistics Giant from Critical Vulnerabilities
This article emphasizes the critical importance of API security, highlighting how misconfigurations can lead to significant vulnerabilities and potential data breaches. It discusses a case study where BeVigil helped a logistics company identify and rectify a major API security gap involving the Kong API Gateway. Affected: Kong API Gateway

Keypoints :

APIs are essential for modern business operations, facilitating integrations and service delivery.…
Read More

Victim: KEEACTIONSPORTS.COM Country : US Actor: clop Source: Discovered: 2025-01-24 17:13:10.700557 Published: 2025-01-24 17:13:10.700557 Description : Online retailer specializing in sports-related goods and equipment Caters to the needs of sports enthusiasts Product range covers various sports: golfing, running, swimming, team sports, etc. Focus on high-quality sporting goods Aims to enhance performance and ensure customer satisfaction

About Country: United States

– Cybersecurity Landscape: The U.S.…

Read More

Victim: NORTHERNONTARIOWIRES.COM Country : CA Actor: clop Source: Discovered: 2025-01-24 17:16:35.500026 Published: 2025-01-24 17:16:35.500026 Description : NorthernOntarioWires.com is based in Northern Ontario, Canada. Operates in the utilities sector, focusing on electricity distribution. Aims to provide reliable and cost-effective electric service. Primarily serves residential and commercial sectors in Northern Ontario.…
Read More