Silent Push Uncovers Chinese Fake Marketplace e-Commerce Phishing Campaign Using Thousands of Websites to Spoof Popular Retail Brands

Silent Push Threat Analysts uncovered a large-scale Chinese-operated phishing campaign targeting global shoppers through thousands of fake marketplace websites spoofing major retail and payment brands. The campaign notably exploited the “Hot Sale 2025” event in Mexico and used advanced payment scams involving services like Google Pay to steal user financial information….

Read More
@mentalpositive’s New macOS Stealer: AMOS Repackaged or a New Cyber Threat?

A new macOS stealer by MentalPositive has been identified targeting Ledger Live users in 2025, potentially representing a variant of the 2023 Atomic macOS Stealer (AMOS). This new malware exhibits similarities in credential and crypto wallet theft but uses different programming languages and introduces unique build IDs for campaign management. #MentalPositive #AMOS #LedgerLive

Read More
Blind Eagle Phishing Campaign

Since 2018, APT-C-36, known as Blind Eagle, has targeted Latin American organizations, especially in Colombia, using phishing campaigns and exploiting vulnerabilities like CVE-2024-43451. In a recent campaign detected by Darktrace in 2025, Blind Eagle used WebDAV-based payload delivery and dynamic DNS for command-and-control, leading to data exfiltration from a Colombian customer. #BlindEagle #APT-C-36 #CVE-2024-43451 #WebDAV #Remcos

Read More
Extracting Sensitive Information from Azure Load Testing

The Azure Load Testing service allows embedding of scripting code within JMeter (JMX) and Locust files, enabling attackers to execute commands, generate Managed Identity tokens, and extract secrets or certificates. Automated tools like MicroBurst can exploit these features to perform code execution, reverse shells, and secret extraction, highlighting detection opportunities through Azure Diagnostics Logs. #AzureLoadTesting #JMeter #ManagedIdentity #MicroBurst

Read More
DCRAT Impersonating the Colombian Government

A phishing campaign targeting Colombian organizations uses a Remote Access Trojan (DCRAT) distributed via obfuscated email attachments to gain control and steal sensitive data from infected Microsoft Windows systems. The attack chain employs multiple evasion techniques including steganography, base64 encoding, and multi-stage payload delivery to avoid detection. #DCRAT #ColombianGovernment #FortiMail

Read More
Jasper Sleet: North Korean Remote IT Workers’ Evolving Tactics to Infiltrate Organizations

Since 2024, North Korean remote IT workers have been leveraging AI technologies like image manipulation and voice-changing software to enhance fraudulent employment operations worldwide. Microsoft tracks these activities under the codename Jasper Sleet and advises organizations to strengthen vetting and monitoring procedures to defend against this sophisticated insider threat. #JasperSleet #NorthKoreanITWorkers #Faceswap #AstrillVPN

Read More
Remcos Malware Campaign

Remcos malware campaigns have remained highly active, utilizing sophisticated techniques such as NT namespace path parsing to create spoofed Windows system directories and evade detection. The malware spreads mainly through phishing emails containing malicious shortcut files, enabling attackers to gain persistent control over infected systems. #Remcos #NTNamespace #PhishingEmails #Esentutl

Read More
A DNS Examination of the Phishing Campaign Targeting Japanese Brokerage Firms

Cybercriminals hijacked Japanese securities accounts, leading to over 3,500 fraudulent stock transactions and losses exceeding ¥300 billion from January to April 2025. Through analysis of phishing-related domains and emails, researchers uncovered thousands of connected domains, including those weaponized for phishing attacks targeting stock owners. #JapaneseStockFraud #PhishingDomains

Read More
Analysis of Kim Sooki Group Threat Cases Using the ‘ClickFix’ Tactics

The Kimsuky group’s ClickFix tactic manipulates victims into executing malicious PowerShell commands via deceptive messages and phishing emails, often disguising itself as error notifications or security procedures. This threat has been employed by state-sponsored actors from North Korea, Iran, and Russia, emphasizing the need for robust EDR detection strategies against obfuscated malware and unusual behaviors. #ClickFix #Kimsuky #BabyShark

Read More
10 Things I Hate About Attribution: RomCom vs. TransferLoader

TA829 is a cybercriminal actor that also conducts espionage campaigns aligning with Russian state interests, utilizing custom malware like SingleCamper and DustyHammock. A separate cybercriminal cluster, UNK_GreenSec, operates a similar infrastructure and tactics deploying the TransferLoader malware, which has been observed delivering Morpheus ransomware. #TA829 #UNK_GreenSec #TransferLoader #SingleCamper #DustyHammock #MorpheusRansomware…

Read More

A threat actor conducted a multi-day intrusion starting with a password spray attack on an exposed RDP server, followed by credential harvesting using Mimikatz and Nirsoft tools, extensive network discovery, data exfiltration via Rclone over SFTP, and finally deploying RansomHub ransomware across the network using SMB and remote services. The incident featured lateral movement using legitimate tools like Atera and Splashtop for persistence and exhibited advanced evasion tactics including clearing shadow copies and event logs. #RansomHub #Mimikatz #Rclone #Atera #Splashtop #RDPPasswordSpray

Read More