Skip to content

Cybersecurity News Everyday

Stay Ahead of Cyber Threats – Daily Security Insights, Powered by AI

    • Cyber Attack & Data Breach
    • Daily Recap
    • Disclaimer
    • Hacked: Web Defacement
    • Security Report
    • Web Statistics
    • YouTube Overview
    • Welcome!
    • Threat Research
    • Security News
    • Ransom Monitor
    • Interesting Stuff

Tag: BLOCKCHAIN

Threat Research

Luring with love, a network of pig butchering ā€œminingā€ scams robbed millions from victims’ wallets

December 14, 2023October 19, 2025 Securonix

Sophos traces a multinational pig butchering network that uses fake DeFi apps and social engineering to drain victims’ crypto wallets across dozens of domains and contract wallets, laundering millions in proceeds. The operation appears to involve multiple affi…

Read More
Threat Research

DNS Early Detection – Lazarus KandyKorn – Malicious DNS in the News | Infoblox

December 13, 2023October 17, 2025 Securonix

Infoblox’s DNS Early Detection Program identifies potentially malicious domains at the earliest opportunity, enabling blocking well before OSINT or many threat intel feeds. The Lazarus Group’s KandyKorn campaign illustrates how fast DNS-based detection can dis…

Read More
Threat Research

Crypto Deception Unveiled: Check Point Research Reports Manipulation of Pool Liquidity Skyrockets Token Price by 22,000%. – Check Point Research

December 5, 2023October 14, 2025 Checkpoint

Check Point Research documented a liquidity-pool manipulation where an attacker used a hidden backdoor to burn WIZ tokens, inflating the WIZ/WETH price by ~22,000% and then sold into the spike to steal about $80,000. The operation involved two attacker wallets…

Read More
Threat Research

Crypto Country: North Korea’s Targeting of Cryptocurrency

November 30, 2023October 16, 2025 RecordedFuture

In a new report, Recorded Future’s Insikt Group examines North Korea’s success in its cybercriminal operations targeting the cryptocurrency industry.

Read More
Threat Research

TrickMo’s Return: Banking Trojan Resurgence With New Features – Cyble

November 30, 2023October 20, 2025 Securonix

TrickMo reemerged in 2023 as an enhanced Android banking Trojan, shifting from screen recording to overlay-based credential capture and using JsonPacker for obfuscation. It communicates with a C2 server at keepass.ltd (194.169.175.138) and targets a broad set …

Read More
Threat Research

New SugarGh0st RAT targets Uzbekistan government and South Korea

November 28, 2023October 15, 2025 Securonix

Cisco Talos uncovered a campaign that delivers a new remote access trojan called ā€œSugarGh0st,ā€ likely active since August 2023 and targeting Uzbekistan’s Ministry of Foreign Affairs and users in South Korea. The operation uses two infection chains via Windows …

Read More
Threat Research

DPRK Crypto Theft | macOS RustBucket Droppers Pivot to Deliver KandyKorn Payloads

November 22, 2023October 16, 2025 Securonix

North Korean-aligned threat actors targeting macOS staged a busy 2023, with RustBucket and KandyKorn as the two major campaigns examined. The analysis shows actors mixing components across operations—using SwiftLoader droppers to pivot to KandyKorn payloads—an…

Read More
Threat Research

Check Point Research Unraveling the Rug Pull: a Million-Dollar Scam with a Ā Fake Token Factory – Check Point Research

November 21, 2023October 15, 2025 Checkpoint

Check Point Research detected a coordinated rug pull that siphoned nearly $1 million by creating fake tokens, inflating perceived trading activity, and withdrawing liquidity. The actor used wallet 0x6b140e79db4d9bbd80e5b688f42d1fcf8ef97798 and fake tokens such…

Read More
Threat Research

Distribution of Malicious LNK File Disguised as Producing Corporate Promotional Materials – ASEC BLOG

November 21, 2023October 15, 2025 Securonix

ASEC detected a malicious LNK file distributed to financial and blockchain personnel via email and other distribution methods, masquerading as Blockchain Corporate Solution Handbook Production.zip. The LNK leads to a multi-stage chain of payloads, including ob…

Read More
Threat Research

Russian Reshipping Service ā€˜SWAT USA Drop’ Exposed – Krebs on Security

November 2, 2023October 16, 2025 Securonix

The Russia-based SWAT USA Drop reshipping service, a major operation laundering stolen merchandise, was hacked, exposing its internal operations, finances, and organizational structure. The leak details how ā€œdropsā€ and ā€œstuffersā€ use stolen credit cards to buy…

Read More
Threat Research

Elastic catches DPRK passing out KANDYKORN — Elastic Security Labs

October 25, 2023October 15, 2025 Securonix

Elastic Security Labs details a DPRK-linked intrusion targeting blockchain engineers via a Discord DM lure, employing a multi-stage Python-based chain and memory-resident payloads (SUGARLOADER, HLOADER, KANDYKORN) with RC4-encrypted C2 communications. The oper…

Read More
Threat Research

Anomali Cyber Watch I Cyber Security News on Latest Threats | Anomali

October 18, 2023October 13, 2025 Securonix

Anomali’s Cyber Watch roundup covers multiple campaigns including ROMCOM 4.0 (PEAPOD) backdoors targeting defense and government sectors, a typosquatted RedAlert Android infostealer, EtherHiding via blockchain hosting, the NoEscape ransomware, and ShellBot DDo…

Read More
Threat Research

ā€œEtherHidingā€ā€Šā€”ā€ŠHiding Web2 Malicious Code in Web3 Smart Contracts

October 13, 2023October 16, 2025 Guardio-Security

Threat actors behind the “ClearFake” campaign have shifted from Cloudflare Workers to hosting malicious JavaScript payloads inside Binance Smart Chain (BSC) smart contracts, allowing read-only eth_call requests from compromised WordPress sites to retrieve and …

Read More
Threat Research

Unveiling the Shadows: The Dark Alliance between GuLoader and Remcos – Check Point Research

September 19, 2023October 16, 2025 Securonix

Checkpoint researchers expose a dual-use ecosystem where GuLoader and Remcos are marketed as legitimate tools, with GuLoader acting as a crypter to help Remcos evade antivirus and deliver payloads. The investigation ties BreakingSecurity and VgoStore to ThePro…

Read More
Threat Research

Latest evolution of ā€˜pig butchering’ scam lures victim into fake mining scheme

September 14, 2023October 20, 2025 Securonix

Sophos X-Ops documents a surge in pig butchering scams that push victims into fake liquidity mining schemes, exploiting DeFi concepts and social engineering rather than malware. A detailed victim case shows romance-based outreach via MeetMe, persistent multi-c…

Read More

Posts pagination

Previous 1 … 41 42 43 … 45 Next

What are you looking for ?

  • šŸ–„ļø [ D A S H B O A R D ]
  • šŸ•µļøā€ā™‚ļø Threat Research
  • šŸ“° Security News
  • 🚨 Attack & Data Breach
  • šŸ›‘ Ransomware Monitor
  • šŸ’€ Hacked! Web Defacement
  • ✨ Interesting Stuff
  • šŸ“ŗ Youtube Overview
  • šŸ” Google Cybersecurity
  • šŸ“¢ Telegram Notification
  • šŸ“° News Daily Recap
  • šŸ“° Security Report
Twitter/X @TweetThreatNews
Facebook @Cybersecurity
LinkedIn Hendry Adrian

Website Disclaimer

Proudly powered by WordPress | Theme: Fairy Dark by Candid Themes.