Old Miner, New Tricks

The article investigates a campaign involving the H2Miner crypto-mining botnet and a newly discovered AI-generated ransomware variant called Lcrypt0rx, which targets Linux, Windows, and container environments. This combined threat delivers multiple malicious tools, including miners and stealers, resulting in data encryption, compute hijacking, and system defacement. #H2Miner #Lcrypt0rx #Kinsing #Xmrig #LummaStealer

Read More
Multi-Stage Phishing via Reservation Portals

A recent phishing campaign exploited Booking.com’s official messaging system to send fraudulent messages and steal credit card details using cleverly disguised domains and multi-stage redirects. The investigation uncovered extensive infrastructure, including redirector and phishing content domains, alongside associated malware files and threat actor Telegram accounts. #BookingPhishing #BookingConfirmationID #TelegramOperators

Read More
Tracking Protestware Spread: 28 npm Packages Affected by Payload Targeting Russian-Language Users

Socket’s Threat Research Team discovered that multiple npm packages contain protestware targeting Russian-language users on Russian or Belarusian domains by disabling UI interactions and playing the Ukrainian national anthem. This protestware originated from the SweetAlert2 package and has unintentionally propagated across numerous other packages without disclosure. #SweetAlert2 #Protestware #SocketThreatResearchTeam

Read More
APT PROFILE – FANCY BEAR

Fancy Bear (APT28) is a Russian cyberespionage group targeting governments, military, and high-value organizations globally, notably influencing elections and exploiting webmail vulnerabilities. Their recent campaigns focus on the Ukraine conflict, espionage against Western logistics, and leveraging malicious documents in Central Asia, using sophisticated malware and phishing techniques. #FancyBear #APT28 #CHERRYSPY #HATVIBE #CVE2023-43770

Read More
I SPy: Escalating to Entra ID’s Global Admin with a first-party app

Research revealed that Microsoft first-party application service principals (SPs), specifically Office 365 Exchange Online’s SP, can be exploited for privilege escalation and persistence in hybrid Entra ID environments by abusing Domain.ReadWrite.All permissions. Attackers with Cloud Application Administrator or Application Administrator roles can add credentials to these SPs, add federated domains, and forge SAML tokens to impersonate any hybrid user, including Global Administrators. #Office365ExchangeOnline #ServicePrincipalHijacking

Read More
Lookout Discovers Massistant Chinese Mobile Forensic Tooling

Researchers uncovered a Chinese mobile forensics application named Massistant used by law enforcement to extract data from confiscated devices, believed to be the successor to MFSocket. Massistant employs advanced techniques like Accessibility Services and connects via Android Debug Bridge over WiFi, posing risks to travelers’ mobile privacy. #Massistant #MFSocket #MeiyaPico

Read More
From a Teams Call to a Ransomware Threat: Matanbuchus 3.0 MaaS Levels Up

Matanbuchus 3.0 is a sophisticated malware loader used primarily on Windows systems to deliver secondary payloads and enable stealthy, persistent cyberattacks. It features advanced evasion techniques, WQL query support, in-memory execution, and impersonates legitimate applications to communicate with command-and-control servers. #Matanbuchus #Morphisec #EventLogBackupTask

Read More
Behind the Making of Operation Frostbyte: The First Snowflake GOAT

Operation Frostbyte is an open-source cybersecurity training environment created by Varonis Threat Labs to simulate real-world attacks on Snowflake cloud data platforms. It combines an 8-bit video game theme with practical exercises to help security professionals understand and mitigate threats from misconfigurations in Snowflake. #OperationFrostbyte #Varonis #Snowflake…

Read More
Unmasking AsyncRAT: Navigating the labyrinth of forks

AsyncRAT, an open-source remote access trojan, has evolved through numerous forks, significantly impacting malware landscapes with variants like DcRat and VenomRAT. These forks extend functionality with unique plugins and advanced evasion techniques, highlighting the growing sophistication of open-source malware threats. #AsyncRAT #DcRat #VenomRAT #NonEuclidRAT #JasonRAT

Read More
A Hybrid Approach of BlackSuit Ransomware

The Cybereason Security Services report analyzes a sophisticated BlackSuit ransomware attack that utilized tools like Cobalt Strike, rclone, and Windows native processes for lateral movement, data exfiltration, and file encryption. The attack uniquely combined data deletion and partial encryption to speed execution and evade detection, posing a significant threat to targeted organizations. #BlackSuit #CobaltStrike #rclone

Read More
June 2025 Infostealer Trend Report

This report analyzes the distribution trends of Infostealer malware in June 2025, highlighting various disguises such as cracks and keygens, and the use of SEO poisoning for distribution. It also details emerging threats like the modified ACRStealer and novel infection methods involving installer screens and password-protected files. #ACRStealer #LummaC2 #DLLSideLoading #Infostealer…

Read More
Fake Android Money Transfer App Targeting Bengali-Speaking Users | McAfee Blog

McAfee’s Mobile Research Team uncovered an active Android malware campaign targeting Bengali-speaking expatriates by impersonating popular financial apps like TapTap Send and AlimaPay to steal personal and financial data. The campaign uses phishing sites and fake Facebook pages for distribution, with a publicly exposed C2 server storing stolen information accessible to…

Read More