Summary: Africa has seen a significant increase in phishing-related cybercrime, particularly targeting small and midsize businesses, due to inadequate user training and the rapid growth of technology and connectivity on the continent.

Threat Actor: Phishing attackers Victim: Small and midsize businesses in Africa

Key Point :

Africa has experienced exponential growth in phishing-related cybercrime, especially against small and midsize businesses.…
Read More

Key Takeaways 

Cyble Research and Intelligence Labs (CRIL) recently encountered a campaign using a malicious Excel document linked to the UNC1151 APT group.  

The UNC1151 APT group, originating from Belarus, is notorious for targeting Eastern European countries, including Ukraine, Lithuania, Latvia, Poland, and others. 

In the recent campaign, there are indications that the group is possibly targeting Ukraine, with a potential focus on the Ministry of Defence based on the lure document. …
Read More

Published On : 2024-06-03

Executive Summary

At CYFIRMA, we are dedicated to providing current insights into prevalent threats and strategies utilized by malicious entities, targeting both organizations and individuals. This in-depth examination focuses on the Vidar Stealer, an information stealer operating as a malware-as-a-service. The research explores the tactics employed by threat actor(s) to evade detection on the system and over the network, as well as their techniques for concealing malicious code and activities.…

Read More

Authored by Dexter Shin

Many government agencies provide their services online for the convenience of their citizens. Also, if this service could be provided through a mobile app, it would be very convenient and accessible. But what happens when malware pretends to be these services?

McAfee Mobile Research Team found an InfoStealer Android malware pretending to be a government agency service in Bahrain.…

Read More

Key Points

ReliaQuest observed new execution techniques in a campaign from the JavaScript framework “ClearFake,” tricking users into copying, pasting, and manually executing malicious PowerShell code. Upon execution, the PowerShell code performs multiple functions, including clearing the DNS cache, displaying a message box, downloading further PowerShell code, and installing “LummaC2” malware.…
Read More

Summary: The content discusses the rise of identity-related incidents in businesses and highlights recent incidents involving social engineering, credential stuffing, and lack of multi-factor authentication.

Threat Actor: N/A

Victim: Clorox, MGM, Caesars, 23andMe, UnitedHealth

Key Point :

Identity-related incidents are on the rise due to identity sprawl and system complexity.…
Read More

What happened 

Proofpoint recently identified a cluster of activity conducting malicious email campaigns using piano-themed messages to lure people into advance fee fraud (AFF) scams. The campaigns have occurred since at least January 2024, and are ongoing. Most of the messages target students and faculty at colleges and universities in North America, however other targeting of industries including healthcare and food and beverage services was also observed.…

Read More

In this blog we examine how Darktrace was able to detect and block malicious phishing emails sent via Microsoft Teams that were impersonating an international hotel chain.

Social Engineering in Phishing Attacks

Faced with increasingly cyber-aware endpoint users and vigilant security teams, more and more threat actors are forced to think psychologically about the individuals they are targeting with their phishing attacks. Social…

Read More

Summary: The content discusses the increase in vulnerability exploitation as an initial access vector in 2023, with a focus on the MOVEit breach. It also highlights the targeting of zero-day vulnerabilities by ransomware actors and the involvement of third parties in data breaches.

Threat Actor: N/A

Victim: N/A

Key Point :

The exploitation of vulnerabilities almost tripled as an initial access vector in 2023, fueled in part by the MOVEit breach.…
Read More

Summary: This content discusses the limitations of using traditional metrics as key performance indicators (KPIs) for measuring security progress in cybersecurity and emphasizes the importance of considering security processes for a complete picture of security outcomes.

Threat Actor: N/A

Victim: N/A

Key Point:

CISOs have traditionally relied on specific metrics, such as vulnerabilities detected and patched, to measure security progress.…
Read More

Summary: An Indian national pleaded guilty to wire fraud conspiracy for stealing over $37 million through a fake Coinbase website used to steal credentials.

Threat Actor: Chirag Tomar | Chirag Tomar Victim: Coinbase | Coinbase

Key Point :

Chirag Tomar and his co-conspirators created a fake website to mimic the Coinbase Pro website in order to trick legitimate Coinbase customers into entering their login credentials and two-factor authentication codes.…
Read More

Google Chrome has been the dominant web browser for years now, which is why it may come as a surprise to hear of a startup, not even based in Silicon Valley, called The Browser Company offering a new take on the “window to the internet”.

The Arc browser has been available for MacOS since July 2023, but the Windows version was only released a couple of weeks ago.…

Read More

Summary: This article discusses the decline of traditional phishing messages and the rise of more advanced social engineering-driven attacks, such as spear-phishing and business email compromise (BEC), and emphasizes the need for CISOs to enact the right policies to combat these threats.

Threat Actor: GenAI tools | GenAI tools Victim: CISOs | CISOs

Key Point :

Traditional phishing messages are on the decline, while more advanced social engineering-driven attacks, such as spear-phishing and BEC, are becoming more prevalent.…
Read More