Summary: This content discusses the challenges of trying to “get ahead” of cyber attackers and emphasizes the importance of focusing on dissuasion and resilience instead.

Threat Actor: Cyber attackers | cyber attackers Victim: Security professionals | security professionals

Key Point :

Truly “getting ahead” of cyber attackers and preventing their full impact is impossible at scale.…
Read More

Summary: This content provides information about a vulnerability in PTC’s Creo Elements/Direct License Server that allows unauthenticated remote attackers to execute arbitrary OS commands.

Threat Actor: Unauthenticated remote attackers

Victim: PTC’s Creo Elements/Direct License Server

Key Point :

The vulnerability affects versions 20.7.0.0 and prior of Creo Elements/Direct License Server.…
Read More

Summary: The report warns of a resurgence of CapraRAT spyware targeting mobile gamers and weapons enthusiasts through malicious Android applications.

Threat Actor: Transparent Tribe, also known as APT36 | Transparent Tribe Victim: Mobile gamers and weapons enthusiasts | Mobile gamers and weapons enthusiasts

Key Point :

The CapraRAT spyware, used by Transparent Tribe, is primarily used for surveillance and has targeted Indian government and military personnel and human rights activists.…
Read More

Summary: The content discusses how the four major banks in Australia are constantly under attack from threat actors, with the aim of stealing sensitive information and money from customers.

Threat Actor: Unknown threat actors

Victim: ANZ Bank, Commonwealth Bank, National Australia Bank (NAB), and Westpac

Key Point :

The four major banks in Australia are under constant attack, with threat actors launching a barrage of attacks every minute of every day.…
Read More

Key Points

In June 2024, ReliaQuest responded to detections from an endpoint detection and response (EDR) tool signaling the beginning of a ransomware attack by the “Medusa” ransomware group that resulted in the encryption of various hosts in a customer environment. Since 2022, the Ransomware-as-a-Service (RaaS) group Medusa has targeted organizations in the technology, education, manufacturing, and healthcare sectors by taking advantage of unpatched vulnerabilities and hijacking legitimate accounts.…
Read More

Summary: Operation First Light 2024, orchestrated by Interpol, resulted in the arrest of thousands of suspects involved in online scams, the freezing of bank accounts, and the seizure of assets worth millions of dollars.

Threat Actor: Online scam networks | online scam networks Victim: Various individuals and organizations targeted by online scams | online scam victims

Key Point :

Operation First Light 2024, led by Interpol, resulted in the arrest of 3950 suspects involved in online scams and the identification of 14,643 more.…
Read More

Summary: Three novel credential-phishing campaigns have emerged from state-sponsored actors, compromising at least 40,000 corporate users in just three months. These campaigns demonstrate an evolution in capabilities and can bypass controls such as multifactor authentication and URL filtering.

Threat Actor: State-sponsored actors | state-sponsored actors Victim: Corporate users | corporate users

Key Point :

The campaigns, named LegalQloud, Eqooqp, and Boomer, use highly evasive and adaptive threat (HEAT) attack techniques to compromise corporate users.…
Read More

Summary: This article discusses the use of social engineering and phishing by scammers to deceive workers and IT help desk staff.

Threat Actor: Scammers | scammers Victim: Workers and IT help desk staff | workers and IT help desk staff

Key Point :

Federal authorities warn of social engineering and phishing techniques used by scammers to deceive workers and IT help desk staff.…
Read More

Summary: The European Union has sanctioned Russian state hackers, including two military officers, who were involved in “hack and leak” operations against Western governments.

Threat Actor: Russian state hackers | Russian state hackers Victim: Western governments | Western governments

Key Point :

The European Union has imposed sanctions on four Russian domestic intelligence agency hackers, including two military officers from the Federal Security Service.…
Read More

Key Takeaways 

Cyble Research and Intelligence Labs (CRIL) recently came across a malware campaign involving a malicious lnk file associated with the UAC-0184 threat actor group. 

Previously, UAC-0184 targeted Ukrainian entities in Finland, utilizing the Remcos RAT in their operations. 

In their latest campaign, there are signs suggesting the group may be focusing on Ukraine, using disguised lure documents to distribute the XWorm RAT. …
Read More

Summary: A new adware family called AdsExhaust is being distributed through a campaign that tricks users searching for the Meta Quest application into downloading it.

Threat Actor: AdsExhaust | AdsExhaust Victim: Users searching for the Meta Quest application | Meta Quest

Key Point :

The adware is capable of exfiltrating screenshots from infected devices and interacting with browsers using simulated keystrokes.…
Read More

ModiLoader aka DBatLoader – Active IOCsJune 21, 2024Multiple IBM i and WebSphere Application Server VulnerabilitiesJune 21, 2024

Analysis Summary

The SideWinder APT (Advanced Persistent Threat) Group is a sophisticated cyber espionage group active since at least 2012. The group is believed to be based in India and has targeted government agencies, military organizations, and financial institutions in South Asia and the Middle East.…

Read More

Recent history could be termed the Age of Ransomware in the realm of cybercrime. However, threat actors have discovered a way to profit without the need for malware development or sophisticated methods. SpaceBears is a new participant in the Data Broker trend, which has gained momentum particularly due to major crackdowns on ransomware groups by security forces.…

Read More

Summary: Multifactor authentication (MFA) is playing a significant role in determining the success of attackers in penetrating network defenses, with MFA appearing in almost half of all security incidents encountered by Cisco Talos incident response teams in the first quarter of the year.

Threat Actor: Attackers attempting to bypass MFA Victim: Various organizations affected by security incidents

Key Point :

Multifactor authentication was involved in almost 50% of security incidents encountered by Cisco Talos incident response teams.…
Read More