Summary: A phishing campaign targeting Chinese entities has been uncovered, utilizing Tencent’s cloud infrastructure to achieve persistent network access. The attackers employ sophisticated techniques, including DLL sideloading and the use of Cobalt Strike, to maintain control and exfiltrate sensitive information.

Threat Actor: Unknown | unknown Victim: Chinese entities | Chinese entities

Key Point :

Attackers use phishing emails with malicious Zip files to deliver Cobalt Strike payloads.…
Read More

Short Summary:

Head Mare is a hacktivist group that emerged in 2023, targeting organizations in Russia and Belarus. They utilize phishing campaigns exploiting vulnerabilities in WinRAR to gain initial access and employ ransomware like LockBit and Babuk to encrypt victims’ data. The group is known for its custom malware, PhantomDL and PhantomCore, and aims to cause significant damage while also demanding ransom for data decryption.…

Read More

Summary: Forescout’s 2024H1 Threat Review highlights a significant increase in vulnerabilities and ransomware attacks in the first half of 2024 compared to the same period in 2023, emphasizing the need for enhanced security measures. The report reveals a 43% surge in published vulnerabilities and a 55% expansion in active ransomware groups, with a particular focus on the targeting of VPN and network infrastructure.…

Read More

Short Summary:

The cyber landscape of 2024 has seen significant developments with a complex network of threat actors making their mark through various attacks, scandals, and tactics. This article highlights the top 10 threat actors of the year, focusing on their impact and the noise they’ve created in global cybersecurity.…

Read More

Short Summary:

Researchers have uncovered numerous scam campaigns utilizing deepfake videos of public figures to promote fraudulent investment schemes and giveaways. These campaigns, linked to a single threat actor group, target various countries and languages, leveraging deepfake technology to deceive potential victims. The analysis of the infrastructure behind these campaigns reveals a sophisticated network of newly registered domains and shared hosting services, complicating attribution and takedown efforts.…

Read More
Short Summary: The article discusses the LummaC2 infostealer, detailing its execution stages, techniques used by threat actors, and the malware’s capabilities to steal sensitive information and communicate with command and control servers.Key Points:Recent increase in LummaC2 infostealer activities. Lumma is a C-based information-stealing malware used as Malware-as-a-Service (MaaS).…
Read More
Short Summary

The Seqrite Labs APT-Team has uncovered a sophisticated cyber campaign targeting government and military officials in the Czech Republic, utilizing NATO-themed lures. The campaign employs a malware ecosystem that includes a Rust-based loader and a Command-and-Control framework known as HavocC2. The analysis details the infection chain, technical aspects of the malware, and the threat actor’s potential origins.…

Read More

Summary: A unique training program called Cyber Range has been established in Kyiv, Ukraine, to prepare military and intelligence personnel against Russian cyberattacks while also allowing broader participation from students and researchers. The initiative focuses on practical exercises and simulations to enhance cybersecurity skills and understanding of offensive and defensive tactics.…

Read More

Summary: The Everest ransomware group, a Russian-speaking cybercriminal organization, is increasingly targeting the healthcare sector, claiming to have stolen sensitive patient data from multiple medical facilities in the U.S. since 2021. U.S. officials have issued warnings about the group’s tactics, which include acting as an initial access broker to facilitate ransomware attacks.…

Read More

Summary: Russian users experienced significant disruptions to various digital platforms, including messaging apps and online services, which the government attributed to a DDoS attack. However, local experts dispute this claim, suggesting that the outages may be a result of government censorship efforts.

Threat Actor: Russian authorities | Russian authorities Victim: Russian internet users | Russian internet users

Key Point :

Disruptions affected multiple platforms, including WhatsApp, Telegram, and Wikipedia.…
Read More

Victim: level.game Country : RU Actor: killsec Source: http://kill432ltnkqvaqntbalnsgojqqs2wz4lhnamrqjg66tq6fuvcztilyd.onion/post/zlRPvZRSjmN2wGF54PjWN23g1.php Discovered: 2024-08-22 15:14:54.331812 Published: 2024-08-22 15:14:53.205677 Description : Level SuperMind is a wellness technology company focused on improving mental clarity and well-being through its mobile app. The app helps users reduce stress, anxiety, and overthinking by offering guided meditations, breathwork, sleep tools, and journaling exercises.…

Read More

Summary: OpenAI has banned ChatGPT accounts linked to an Iranian group, Storm-2035, that was suspected of spreading disinformation about the upcoming US presidential election. Despite their efforts to create fake news articles and social media comments, the operation failed to gain significant audience engagement.

Threat Actor: Storm-2035 | Storm-2035 Victim: US Presidential Election | US Presidential Election

Key Point :

OpenAI identified 12 accounts on X and one on Instagram involved in the influence operation.…
Read More

Summary: A pro-Russian hacker group named Vermin is exploiting Ukraine’s military operations to deploy malware, utilizing deceptive tactics involving images of alleged Russian war criminals. This campaign, reportedly backed by the Kremlin, employs tools like Spectr spyware and a new malware called Firmachagent to compromise devices and steal sensitive information.…

Read More

Summary: A massive DDoS attack targeted Monobank, one of Ukraine’s leading online banks, disrupting a service used for military donations. The attack, which reached 7.5 billion requests per second, was described as “untypical” and was believed to be linked to Russian threat actors.

Threat Actor: Russia | Russia Victim: Monobank | Monobank

Key Point :

The DDoS attack aimed to disrupt a donation service crucial for Ukraine’s military funding.…
Read More

Summary :

Cryptocurrency scams, particularly those involving deepfake technology and hijacked accounts, pose significant risks to investors. The CryptoCore group exploits popular events and personalities to deceive victims into sending their cryptocurrencies. Awareness and understanding of these scams are essential for protection. #CryptoScams #DeepfakeFraud #Cybersecurity

Keypoints :

Cryptocurrency scams have surged alongside the rise of digital currencies.…
Read More

Summary: Cybersecurity researchers have identified new infrastructure associated with the financially motivated threat actor FIN7, revealing connections to IP addresses from Russian and Estonian providers. This discovery builds on previous findings regarding the group’s use of reseller-hosted infrastructure for their e-crime activities.

Threat Actor: FIN7 | FIN7 Victim: Various organizations | Various organizations

Key Point :

New infrastructure linked to FIN7 was discovered, indicating communications from Russian and Estonian IP addresses.…
Read More