Sealed Chain of Deception: Actors leveraging Node.JS to Launch JSCeal

The JSCEAL campaign employs compiled JavaScript malware delivered via malicious advertisements impersonating popular cryptocurrency trading apps, targeting millions of users predominantly in the EU. This sophisticated campaign uses multi-layered infection chains, anti-analysis techniques, and Node.js to execute stealthy information stealing and remote access operations. #JSCEAL #CompiledJavaScript #CryptoMalware #NodeJS

Read More
RedHook: A New Android Banking Trojan Targeting Users in Vietnam

RedHook is a new Android banking trojan targeting Vietnamese users through phishing sites impersonating financial and government institutions, utilizing advanced techniques like WebSocket communication, keylogging, and screen capture via Android’s MediaProjection API. The malware’s low VirusTotal detection and Chinese-language artifacts suggest a Chinese-speaking threat actor behind the campaign. #RedHook #AndroidBankingTrojan #VietnamPhishing

Read More
Gunra Ransomware Group Unveils Efficient Linux Variant

Gunra ransomware has introduced a new Linux variant that enhances encryption speed and customization, enabling attackers to use up to 100 parallel encryption threads and partial file encryption. The group has expanded its targets across multiple countries and industries, showcasing advanced cross-platform tactics to increase its reach. #GunraRansomware #LinuxRansomware #Conti…

Read More

TraderTraitor is a North Korean state-sponsored cyber threat group targeting cryptocurrency and blockchain ecosystems through sophisticated social engineering, supply chain attacks, and cloud compromises. The group has been linked to massive crypto heists, including the $308 million DMM Bitcoin breach and the $1.5 billion Bybit hack. #TraderTraitor #LazarusGroup #DMMBitcoin #Bybit #JumpCloud

Read More
XWorm V6: Advanced Evasion and AMSI Bypass Capabilities Revealed

In September 2024, Netskope Threat Labs disclosed the discovery of XWorm malware version 6.0, which introduces enhanced persistence, anti-analysis techniques, and AMSI bypass capabilities. This latest variant marks its process as critical to prevent termination and continues to execute primarily in memory, posing ongoing threats to targeted systems. #XWorm #AMSIbypass #ProcessProtection

Read More
Revisiting UNC3886 Tactics to Defend Against Present Risk

UNC3886 is an advanced persistent threat group targeting critical infrastructure sectors such as telecommunications, government, and technology through exploitation of zero-day vulnerabilities and sophisticated malware like TinyShell and Reptile. The group employs advanced techniques including custom Linux rootkits and living-off-the-land tactics to maintain stealth and persistence in compromised networks. #UNC3886 #TinyShell…

Read More
Cybersecurity Scams Targeting Fans and Teams at the 2025 Belgian Grand Prix

The 2025 Belgian Grand Prix is a prime target for cyberattacks and scams involving phishing, fake tickets, and counterfeit merchandise, affecting both fans and Formula 1 teams. High-profile incidents have demonstrated risks such as ransomware attacks and cyber espionage on teams like Ferrari and Mercedes-AMG Petronas. #RansomEXX #Ferrari #BelgianGrandPrix2025

Read More
Scavenger Malware Distributed via eslint-config-prettier NPM Package Supply Chain Compromise

A compromised NPM package, eslint-config-prettier, was used to distribute the Scavenger Loader malware, which includes sophisticated anti-analysis features and delivers stealer payloads. The loader communicates with a hard-coded C2 infrastructure to download and execute additional modules, including theft of npmrc files that could lead to further compromise. #ScavengerLoader #eslint-config-prettier #SupplyChainAttack…

Read More
A Special Mission to Nowhere

A phishing campaign exploiting fears during the Israel-Iran conflict offered fraudulent evacuation flights on a fake Embraer Lineage 1000E jet, aiming to steal personal and financial information. The scam involved a suspicious domain and fake booking details, misleading users with unrealistic prices and travel logistics. #OperationRisingLion #lineageembraer.online

Read More