DeadLock Ransomware Uses Polygon Smart Contracts For Proxy Rotation

DeadLock is a ransomware operation that exploits Polygon blockchain smart contracts to manage proxy server addresses, showcasing a novel and resilient command-and-control technique. Its use of decentralized blockchain technology presents new challenges for cybersecurity defenses and indicates a potential trend in blockchain abuse by cybercriminals. #DeadLock #Polygon #BlockchainAbuse…

Read More
HUMINT Operations Uncover Cryptojacking Campaign: Discord-Based Distribution of Clipboard Hijacking Malware Targeting Cryptocurrency Communities

CloudSEK STRIKE’s HUMINT uncovered a false-flag campaign by an actor using the alias “RedLineCyber” who distributes a PyInstaller-packed clipboard hijacker via Discord and Telegram, targeting cryptocurrency streamers and gambling communities. The malware, distributed as Pro.exe (also peeek.exe), monitors the Windows clipboard and silently replaces copied crypto addresses with attacker-controlled wallets for six cryptocurrencies while persisting via an HKCU Run key. #RedLineCyber #Pro.exe

Read More
GoBruteforcer Botnet Targets Crypto Project Databases by Exploiting Weak Credentials

A new wave of GoBruteforcer attacks targets cryptocurrency and blockchain project databases to build botnets for brute-forcing various Linux server services. These campaigns exploit weak defaults, legacy web stacks, and misconfigured servers to infect hosts and facilitate cybercriminal activities such as blockchain balance querying. #GoBruteforcer #LinuxServers…

Read More
Cybersecurity News | Daily Recap [09 Jan 2026]

Daily Recap, UK unveils a new national cyber action plan to close public-sector gaps and strengthen defenses across government, while the US signals broad diplomatic shifts by exiting global cyber coalitions and dozens of international treaties. In industry and innovation, CrowdStrike will buy identity-security firm SGNL for $740 million to expand identity threat coverage, Blackbird.AI raises 28 million to grow its narrative-intelligence platform and analytics, and OpenAI launches ChatGPT Health with isolated, encrypted controls for sensitive health data to support HIPAA-style protections. #UKCyberPlan #USExit #CrowdStrike #SGNL #BlackbirdAI #OpenAIHealth #AgenticAI #ChromeExtensions #jsPDF #n8n #CiscoISE #MFA #Taiwan #China #Iberia #Prosura #MicrosoftExchangeOnline #GoBruteforcer #RustFS

Read More
Inside GoBruteforcer: AI-Generated Server Defaults, Weak Passwords, and Crypto-Focused Campaigns

GoBruteforcer is a modular Go-based botnet that brute-forces FTP, MySQL, PostgreSQL and phpMyAdmin credentials to compromise Linux servers and recruit them as scanning and brute-force nodes. The 2025 variant adds an obfuscated Go IRC bot, downloader modules, process-masking and cron persistence, and has been observed targeting crypto project databases and legacy stacks like XAMPP that expose weak defaults #GoBruteforcer #XAMPP

Read More
New GoBruteforcer attack wave targets crypto, blockchain projects

A new wave of GoBruteforcer botnet malware is targeting exposed databases of cryptocurrency and blockchain projects, exploiting weak server configurations often generated by AI. The malware relies on brute-force attacks on FTP, MySQL, and phpMyAdmin services, mainly compromising Linux servers using default credentials. #GoBruteforcer #AIgeneratedConfigurations

Read More
Security briefing: December 2025

December 2025 closed with multiple high-impact disclosures and incidents, including the unauthenticated React2Shell RCE (CVE-2025-55182), the resurfacing of the BRICKSTORM backdoor, widespread MongoBleed data exposure (CVE-2025-14847), and a novel EtherRAT campaign using Ethereum smart contracts for C2. Organizations were urged to patch vulnerable software, audit and segment MongoDB deployments, apply published IOCs and detections from NSA/CISA and Sysdig, and strengthen visibility and resilience heading into 2026. #React2Shell #BRICKSTORM

Read More
Cryptocurrency theft attacks traced to 2022 LastPass breach

Cryptocurrency thefts linked to the 2022 LastPass breach have been traced through blockchain analysis, revealing a prolonged campaign of wallet draining and money laundering via Russian exchanges. The investigation highlights the involvement of Russian cybercriminal groups and the sophisticated use of privacy techniques like CoinJoin. #LastPassBreach #TRMLabs #RussianCybercrime #CoinJoin

Read More
ThreatsDay Bulletin: GhostAd Drain, macOS Attacks, Proxy Botnets, Cloud Exploits, and 12+ Stories

The beginning of 2026 reveals a landscape of subtle and targeted cyber threats, with hackers evolving their tactics even during holidays. Key incidents include malware scams, exploitation campaigns, and backdoored devices, highlighting the increasing sophistication of cyber adversaries. #KMSAuto #ColdFusionExploitation…

Read More