REMCOS_Backdoor

Malicious LNK (Windows Shortcut) files are used in stealthy, multi-stage attacks to deliver the REMCOS backdoor by exploiting PowerShell commands and Base64 decoding techniques. These shortcuts disguise harmful payloads as legitimate files to evade detection and gain persistent access to victim systems. #REMCOS #WindowsLNK #PowerShell

Read More
MSPs a top target for Akira and Lynx ransomware

Akira and Lynx ransomware gangs operate using a RaaS model with double extortion tactics, targeting mainly SMBs and MSPs through stolen credentials, VPN vulnerabilities, and sophisticated techniques. Akira is linked to Conti’s leaked code, while Lynx incorporates elements from LockBit and INC ransomware, using advanced methods to disable security, delete shadow copies, and exfiltrate data. #Akira #Lynx #Conti #LockBit #INC

Read More
GenAI Used For Phishing Websites Impersonating Brazil’s Government

Threat actors are using generative AI tools like DeepSite AI and BlackBox AI to create highly convincing phishing pages impersonating Brazil’s State Department of Traffic and Ministry of Education, leveraging SEO poisoning to increase visibility. These phishing campaigns collect sensitive personal information, validate it using an API, and ultimately defraud victims by requesting payments through Brazil’s Pix system. #DeepSiteAI #BlackBoxAI #BrazilPix

Read More
Android SpyBanker: Rerouting Calls to Attackers

A new Android banking Trojan named ā€œCustomer Help Service.apkā€ targets Indian banking users by stealing sensitive data and redirecting calls through a hardcoded number. The malware employs unique features such as call forwarding manipulation and comprehensive data collection, including SMS, calls, and OTPs, to facilitate financial fraud. #SpyBanker #CustomerHelpService #IndianBanks

Read More
Beneath the Belly of the Latest BlueNoroff Attack: A DNS Investigation

The BlueNoroff attack involved a malicious Zoom extension disguised as a Calendly invite, leading to the download of malware via a fake Zoom domain. Investigations uncovered multiple domains, IP addresses, and email-connected domains linked to the attack, with some domains identified as likely malicious well before the attack was discovered. #BlueNoroff #ZoomExtension #Huntress

Read More
Android Malware Targets Indian Banking Users to Steal Financial Info and Mine Crypto | McAfee Blog

McAfee’s Mobile Research Team uncovered an Android malware campaign targeting Hindi-speaking users in India by impersonating popular financial apps and distributing malicious apps via phishing websites. The malware steals personal financial information and clandestinely mines Monero cryptocurrency using XMRig, triggered remotely by Firebase Cloud Messaging (FCM). #XMRig #FirebaseCloudMessaging #Monero #SBI #AxisBank…

Read More
Ghost in the Zip | New PXA Stealer and Its Telegram-Powered Ecosystem

SentinelLABS and Beazley Security uncovered a large-scale infostealer campaign leveraging the Python-based PXA Stealer, involving sophisticated deployment and evasion techniques to steal sensitive data from over 4,000 victims worldwide. The threat actors, linked to Vietnamese-speaking cybercriminal groups, monetize the stolen data through Telegram-based underground marketplaces, utilizing legitimate infrastructure to automate exfiltration and resale. #PXAStealer #Telegram #HaihaisoftSideloading

Read More
Cato CTRLā„¢ Threat Research: New Streamlit Vulnerability Enables Cloud Account Takeover Attack and Stock Market Dashboard TamperingĀ 

A vulnerability in Streamlit’s file upload feature allows threat actors to bypass file type restrictions and take over misconfigured cloud instances, risking manipulation of financial data dashboards. The flaw stems from client-side enforcement without backend validation, which can be exploited for cloud account takeover and stock market disruption. #Streamlit #CloudAccountTakeover #FinancialDashboards

Read More
VELETRIX Loader Dissection: Kill Chain Analysis of China-Nexus Telecommunications Infrastructure Targeting – 0x0d4y Malware Reseach

This analysis investigates the DragonClone campaign attributed to a China-Nexus Threat Actor, highlighting their use of sophisticated cyber warfare tactics targeting China Mobile Tietong, a major telecommunications company. The study provides a deep technical analysis of the VELETRIX loader, its shellcode, command and control infrastructure, and how it facilitates mass espionage…

Read More