Research by: Antonis Terefos

Introduction

PDF (Portable Document Format) files have become an integral part of modern digital communication. Renowned for their universality and fidelity, PDFs offer a robust platform for sharing documents across diverse computing environments. PDFs have evolved into a standard format for presenting text, images, and multimedia content with consistent layout and formatting, irrespective of the software, hardware, or operating system used to view them.…

Read More

Summary: Online fraud operations in Southeast Asia are growing rapidly, with organized scamming syndicates stealing an estimated $64 billion each year worldwide.

Threat Actor: Organized scamming syndicates

Victim: Potential victims contacted on messaging platforms or dating apps

Key Point :

Scammers in Southeast Asia are stealing about $43.8 billion each year through scams, which accounts for 40% of the combined formal GDP of Cambodia, Laos, and Myanmar.…
Read More

Summary: The content discusses the rise of insider threats, specifically in the context of work-from-home employees and increasing financial pressures.

Threat Actor: Insider Threats | Insider Threats Victim: Various organizations and businesses | organizations and businesses

Key Point:

Filings to anti-fraud non-profit Cifas have increased by 14% due to insider threats, with work-from-home employees and financial pressures being contributing factors.…
Read More

The North Korean hacking group known as Kimsuky has been reported to employ sophisticated methods involving social media platforms and system management tools to conduct espionage activities.

This revelation highlights the evolving tactics of cyber adversaries and the increasing complexity of protecting digital assets.

Utilizing Facebook for Initial Infiltration

According to a recent report from Genians, Kimsuky, a notorious cyber-espionage group, has recently been observed using Facebook to target individuals involved in North Korean human rights and security affairs.…

Read More

Summary: The content discusses the prevalence of document image-of-image fraud technique in identity document fraud and the dominance of selfie spoofing and impersonations in document-related identity fraud.

Threat Actor: Socure | Socure Victim: Various industries including online gaming, marketplaces, lending, and credit cards | Various industries

Key Point :

Document image-of-image was the most prevalent identity (ID) document fraud technique in 2023, occurring in 63% of all IDs that were rejected.…
Read More

AhnLab’s Mobile Analysis Team has confirmed cases of romance scams where perpetrators establish rapport by posing as overseas friends or romantic partners. They exploit this connection to solicit money under the guise of cryptocurrency investments.

A romance scam is a type of fraud that involves emotional manipulation to solicit money through various means. …

Read More

This week, the CERT Polska (CSIRT NASK) and CSIRT MON teams observed a large-scale malware campaign targeting Polish government institutions. Based on technical indicators and similarity to attacks described in the past (e.g. on Ukrainian entities), the campaign can be associated with the APT28 activity set, which is associated with Main Directorate of the General Staff of the Armed Forces of the Russian Federation (GRU).…

Read More

Summary: This article discusses the activities of the Yahoo Boys, a group of young men in West Africa who are prolific scammers and engage in various types of fraud.

Threat Actor: Yahoo Boys | Yahoo Boys Victim: Various individuals | various individuals

Key Point :

The Yahoo Boys are a loose collective of scammers in West Africa who openly engage in fraudulent activities, including sextortion scams.…
Read More

Threat Actor: Anonymous Arabia | Anonymous Arabia Victim: Alrajhi Bank | Alrajhi Bank Price: Not specified Exfiltrated Data Type: Not specified

Additional Information:

Anonymous Arabia launched a Distributed Denial of Service (DDoS) attack against Alrajhi Bank, targeting various facets of the bank’s infrastructure. The attack included websites, e-banking systems, mail servers, and FTP servers.…
Read More

Summary: This content discusses the prevalence of recovery fraud in the cryptocurrency space, where victims of crypto scams or cyberattacks are targeted again by individuals or companies claiming to offer recovery services but end up stealing their upfront fees.

Threat Actor: Recovery fraudsters | recovery fraudsters Victim: Individuals who have fallen victim to crypto scams or cyberattacks | crypto scam victims

Key Point :

Recovery fraud, where victims of crypto scams are targeted again by individuals or companies claiming to offer recovery services, is a growing concern in the cryptocurrency space.…
Read More

Summary: This content discusses a path traversal-affiliated vulnerability pattern found in multiple popular Android applications, which could lead to arbitrary code execution and token theft.

Threat Actor: Microsoft | Microsoft Victim: Multiple popular Android applications | popular Android applications

Key Point :

A path traversal-affiliated vulnerability pattern was discovered in multiple popular Android applications, allowing a malicious application to overwrite files in the vulnerable application’s home directory.…
Read More

Summary: A hacking group linked to Iran’s Revolutionary Guard Corps impersonated journalists and human rights activists as part of a social engineering campaign, targeting organizations such as The Washington Post and prominent think tanks.

Threat Actor: APT42 | APT42 Victim: Various news organizations and think tanks including The Washington Post, The Economist, and the Aspen Institute.…

Read More

Summary: The content discusses the results of a survey conducted by Bitwarden on user password practices, highlighting the prevalence of password reuse and the use of personal information in credentials, which pose significant cybersecurity risks.

Threat Actor: N/A

Victim: N/A

Key Point :

25% of respondents globally reuse passwords across 11-20+ accounts.…
Read More

Written by: Kelli Vanderlee, Jamie Collier

 

Executive Summary

The election cybersecurity landscape globally is characterized by a diversity of targets, tactics, and threats. Elections attract threat activity from a variety of threat actors including: state-sponsored actors, cyber criminals, hacktivists, insiders, and information operations as-a-service entities. Mandiant assesses with high confidence that state-sponsored actors pose the most serious cybersecurity risk to elections.…

Read More

Summary: The Lazarus Group, a North Korea-linked threat actor, used fabricated job lures to distribute a new remote access trojan called Kaolin RAT. The malware is part of a multi-stage attack chain that ultimately deploys the FudModule rootkit.

Threat Actor: Lazarus Group | Lazarus Group Victim: Not specified

Key Point :

The Lazarus Group used fabricated job offers to trick targets into launching a malicious optical disc image (ISO) file.…
Read More

Summary: Iranian state-sponsored hackers infiltrated hundreds of thousands of employee accounts at US companies and government agencies as part of a multiyear cyber espionage campaign aimed at stealing military secrets.

Threat Actor: Iranian state-sponsored hackers | Iranian state-sponsored hackers Victim: US companies and government agencies | US companies and government agencies

Key Point :

An elite team of Iranian state-sponsored hackers successfully infiltrated hundreds of thousands of employee accounts at US companies and government agencies as part of a multiyear cyber espionage campaign aimed at stealing military secrets.…
Read More

Summary: This content highlights the concerns and impact of deepfake technology, particularly in relation to elections and the spread of misinformation and disinformation.

Threat Actor: AI-generated deepfake technology

Victim: General public

Key Point :

23% of Americans have encountered a political deepfake that they later discovered to be fake, indicating the prevalence of this technology.…
Read More