Cyberattacks are increasingly targeting various entities including managed service providers, businesses, and home users. Understanding the stages of these attacks, which range from reconnaissance to control, is essential for strengthening cybersecurity defenses. Threat intelligence plays a crucial role in helping organizations prepare for and respond to these threats effectively.…
Read More
Tag: PHISHING
Victim: Weeks, Brucker & Coleman, Ltd | Legal Services
Country : US
Actor: everest
Source: http://ransomocmou6mnbquqz44ewosbkjk3o5qjsl3orawojexfook2j7esad.onion/weeks-brucker-coleman-ltd-legal-services/
Discovered: 2025-01-27 01:34:10.842697
Published: 2025-01-27 01:34:10.842697
Description :
Weeks, Brucker & Coleman, Ltd internal network was compromised.
More than 150GB of important internal data was exfiltrated.
The stolen data included internal and confidential information.…
Read More
Victim: achieverssciencejournal.org
Country : NG
Actor: funksec
Source: http://funkxxkovrk7ctnggbjnthdajav4ggex53k6m2x3esjwlxrkb3qiztid.onion/achieverssciencejournal.org
Discovered: 2025-01-26 22:12:37.658287
Published: 2025-01-26 22:12:37.658287
Description :
Achievers Science Journal is an educational organization.
Dedicated to producing and distributing science-related content.
Focuses on assisting in the development and learning of students in the science field.
Offers published scientific articles and resources for science learning.…
Read More
Victim: ransom price is 10k for all
Country :
Actor: funksec
Source: http://funkxxkovrk7ctnggbjnthdajav4ggex53k6m2x3esjwlxrkb3qiztid.onion/Funksec2.0
Discovered: 2025-01-26 12:34:45.065024
Published: 2025-01-26 12:34:45.065024
Description :
Clarification about the term “Ransom price is 10k for all”
Suggests it may refer to a situation involving ransomware or a hostage scenario
Indicates it’s not a valid company name
Requests for actual company details if available
About Country: Cybersecurity Perspective and Ransomware Cases
Read More
1.…
Summary: Cybercriminals are increasingly using phishing attacks that spoof well-known brands to deceive users into revealing sensitive information. A recent report from Check Point Research identifies the most commonly spoofed brands and highlights the need for vigilance against these threats. Key brands targeted include Microsoft, Apple, and Google, with specific campaigns impersonating services like PayPal and Facebook.…
Read More
The rapid evolution of AI, particularly tools like ChatGPT, has revolutionized industries — but it has also opened Pandora’s box of cybersecurity risks. From malicious chatbots to regulatory rollbacks, the intersection of AI and cybersecurity demands urgent attention. Here’s a breakdown of the latest threats and how to mitigate them.…
Victim: welcomewagon.com
Country : US
Actor: safepay
Source: http://nz4z6ruzcekriti5cjjiiylzvrmysyqwibxztk6voem4trtx7gstpjid.onion#welcomewagon
Discovered: 2025-01-25 20:27:19.913750
Published: 2025-01-25 20:27:19.913750
Description :
US-based company focused on connecting new homeowners and movers with local businesses.
Specializes in welcoming new residents to their community.
Utilizes direct mail marketing, digital marketing services, and gift books.…
Read More
A trojanized version of the XWorm RAT builder has been weaponized and disseminated primarily through GitHub and other file-sharing services, targeting novice users in cybersecurity. The malware has compromised over 18,459 devices globally, exfiltrating sensitive data and utilizing Telegram for command-and-control operations. Disruption efforts have been made to mitigate its impact, but challenges remain due to offline devices and rate-limiting on Telegram.…
Read More
This week’s cybersecurity overview includes critical vulnerabilities in various software and hardware, exploits of chained vulnerabilities, record-high DDoS attacks, and a notable ransomware surge, particularly impacting education and utilities. The article emphasizes the necessity for improved security measures across affected sectors. Affected: 7-Zip, Asus, Ivanti Cloud Service Appliances, Cisco, Cambium Networks, ABB, UK Education Sector, PowerSchool, US Utilities, Russia, Iran
Read More
Keypoints :
7-Zip has a critical vulnerability (CVE-2025–0411) that allows code execution by bypassing the Mark of the Web security feature.…
Summary: Cybercriminals are now selling access to a malicious generative AI chatbot named GhostGPT, which is designed to aid in various cybercrimes, including malware creation and phishing. This tool, available on Telegram, connects to a modified version of ChatGPT, allowing users to execute attacks without technical barriers.…
Read More
This article explores various types of malware, detailing their characteristics, examples, and consequences in the cybersecurity landscape. It covers viruses, worms, trojans, spyware, rootkits, ransomware, and cryptojacking, highlighting both historical examples and mitigation strategies. Affected: malware, computer systems, data security
Read More
Keypoints :
Malware is software developed to harm computer systems, steal data, or gain unauthorized access.…
This article discusses how cybercriminals exploit GitHub to distribute malware disguised as game hacks and cracked software. McAfee Labs identified multiple repositories that lure users with enticing offers, ultimately leading to the installation of Lumma Stealer variants. The article emphasizes the importance of user education and protective measures against such threats.…
Read More
Victim: INNOTEKEP.COM
Country : HR
Actor: clop
Source:
Discovered: 2025-01-24 17:12:01.595738
Published: 2025-01-24 17:12:01.595738
Description :
Modern technology-oriented company
Specializes in comprehensive digital solutions
Services include website development
Offers mobile app development
Provides UI/UX design services
Engages in digital marketing
Dedicated team of professionals
Committed to delivering efficient and innovative solutions
Aims to help businesses flourish in the digital world
About Country: Cybersecurity Perspective and Ransomware Cases
Read More
– Cybersecurity Framework: The country has implemented a national cybersecurity strategy that emphasizes the protection of critical infrastructure and data privacy.…
Victim: RUIA.COM
Country : IN
Actor: clop
Source:
Discovered: 2025-01-24 17:20:01.979009
Published: 2025-01-24 17:20:01.979009
Description :
Online retail store based in New York
Specializes in high-quality, affordable Indian-inspired products
Founded by Meena Raote in 2015
Product range includes beauty, health, and home decor
Sources products from India using rich Indian heritage
Ensures ethical and sustainable production practices
Offers worldwide shipping services
About Country: Cybersecurity Perspective and Ransomware Cases
Read More
– Cybersecurity Framework: Implemented comprehensive cybersecurity strategies and regulations to enhance national resilience against cyber threats.…
Cisco Talos has reported a notable rise in email threats utilizing hidden text salting, a technique that allows attackers to bypass detection systems by embedding invisible characters in emails. This method complicates the work of email parsers and spam filters, making it easier for phishing attempts to succeed.…
Read More
Summary: The video discusses the increasing sophistication of cyberattacks, focusing on two main stories: hackers exploiting Google search ads to impersonate legitimate businesses and a pastor charged with defrauding his congregation through a fraudulent cryptocurrency scheme. The video highlights the methods used in these scams and the significant amounts of money involved, as well as the challenges in combating these cybercrimes.Keypoints:…
Read More
This article discusses the author’s experience with harvesting phishing emails using a catch-all domain. The author emphasizes the importance of recognizing phishing attempts and outlines the process of analyzing a suspicious email that contained a potential threat. Key insights include examining IP addresses and file hashes to uncover associations with known malware, specifically RedLine Stealer.…
Read More
This article outlines the responsibilities of an Information Security analyst at AIG, focusing on mitigating vulnerabilities like Log4j, preventing ransomware attacks, and implementing continuous monitoring. Key strategies included using resources from CISA for vulnerability assessments and creating custom tools for decryption. Affected: AIG, Cybersecurity & Infrastructure Security Agency (CISA), Apache Log4j, ransomware gangs
Read More
Keypoints :
AIG is an American multinational finance and insurance corporation with operations in over 80 countries.…
This article discusses a recent case where a customer’s website was compromised, leading to malicious redirects to suspicious URLs. The investigation revealed that multiple websites were infected with malware that injected code into the site’s functions.php file, resulting in harmful redirects and potential data leaks. Affected: website
Read More
Keypoints :
A customer reported their website redirecting visitors to a suspicious URL.…
Victim: ORU Mabee Center
Country : US
Actor: rhysida
Source: archive.php?company=158
Discovered: 2025-01-24 16:13:28.369344
Published: 2025-01-24 16:13:28.369344
Description :
Oklahoma’s ORU Mabee Center is a notable venue.
Oral Roberts University (ORU) offers a liberal arts education.
Programs available in diverse fields: business, biology, engineering.
Additional fields of study include computer science, nursing, and criminal justice.…
Read More