Skip to content

Cybersecurity News Everyday

Stay Ahead of Cyber Threats – Daily Security Insights, Powered by AI

    • Cyber Attack & Data Breach
    • Daily Recap
    • Disclaimer
    • Hacked: Web Defacement
    • Security Report
    • Web Statistics
    • YouTube Overview
    • Welcome!
    • Threat Research
    • Security News
    • Ransom Monitor
    • Interesting Stuff

Tag: BLOCKCHAIN

Threat Research

SlowMist: Our In-Depth Investigation of North Korean APT’s Large-Scale Phishing Attack on NFT Users

December 22, 2022October 16, 2025 Securonix

SlowMist analyzes a North Korean APT operation that carried out a large-scale phishing campaign targeting NFT users, exposing how hundreds of fake NFT domains and decoy mint sites were used to harvest wallet approvals and data. The findings tie this campaign t…

Read More
Threat Research

BlueNoroff introduces new methods bypassing MoTW

December 22, 2022October 13, 2025 Securonix

BlueNoroff group expanded its malware delivery methods to bypass Mark-of-the-Web (MOTW) protections by using ISO and VHD disk image formats, and began experimenting with Visual Basic Script, Windows Batch scripts, and a Windows executable. They also operated a…

Read More
Cyber Security News

Glupteba Malware has Returned After Being Disrupted by Google

December 18, 2022September 30, 2025 admin

After nearly a year of being disrupted by Google, the Glupteba malware botnet has again become active, infecting devices worldwide. As a result of Google’s efforts, the blockchain-enabled botnet could be seriously disrupted in December 2021 by securing court orders for control of its infrastructure…

Read More
Threat Research

Nozomi Networks Researchers Track Malicious Glupteba Activity Through the Blockchain

December 13, 2022October 14, 2025 Securonix

Threat actors are increasingly using blockchain to hide and distribute malicious data and C2 instructions. Nozomi Networks researchers track Glupteba activity on the Bitcoin blockchain, showing how OP_RETURN data, XOR encryption, and Tor-based C2 are used, wit…

Read More
Threat Research

Zombinder: new obfuscation service used by Ermac, now distributed next to desktop stealers

November 30, 2022October 16, 2025 Securonix

ThreatFabric researchers describe a multi-platform campaign that binds malicious payloads to legitimate apps via a darknet service called Zombinder, delivering Android banking trojan Ermac alongside Windows desktop malware (Erbium, Aurora, Laplas, and Xenomorp…

Read More
Threat Research

ViperSoftX: Hiding in System Logs and Spreading VenomSoftX – Avast Threat Labs

November 16, 2022October 16, 2025 Securonix

ViperSoftX is a long-running information stealer that hides inside large system log files and uses multi-stage PowerShell payloads to drop VenomSoftX, a browser extension that performs man-in-the-browser attacks to steal cryptocurrency. The campaign spreads ma…

Read More
Threat Research

Water Labbu Abuses Malicious DApps to Steal Cryptocurrency

September 26, 2022October 16, 2025 Securonix

Water Labbu is a threat actor that parasitically hijacks scam DApp websites by injecting malicious JavaScript to steal cryptocurrency. The campaign uses injected payloads and delivery servers to obtain wallet permissions and drain USDT balances, disguising act…

Read More
Threat Research

NFT Malware Gets New Evasion Abilities

September 16, 2022October 15, 2025 Securonix

NFT-001 is a crypto/NFT malware campaign that evolved into a more evasive staged downloader delivering Remcos RAT, with phishing used to lure victims and a multi-stage payload chain designed to bypass defenses. The threat actor relies on private messages, DLL …

Read More
Threat Research

CopperStealer Distributes Malicious Chromium-based Browser Extension to Steal Cryptocurrencies

August 4, 2022October 19, 2025 Securonix

Trend Micro tracks CopperStealer’s new campaign, which distributes a malicious Chromium-based browser extension to steal cryptocurrencies and wallet keys. The operation uses a multi-stage dropper, heavy JavaScript obfuscation, and browser-configuration manipul…

Read More
Threat Research

A new botnet Orchard Generates DGA Domains with Bitcoin Transaction Information

July 29, 2022October 15, 2025 Securonix

Orchard is a botnet family that uses DGA technology to generate C2 domains, incorporating Bitcoin wallet transaction data as inputs to the DGA to increase unpredictability. It has evolved across three versions since 2021, combining hardcoded DuckDNS domains wi…

Read More
Threat Research

Adversary Quest 2022: 4 CATAPULT SPIDER eCrime Challenges | CrowdStrike

July 28, 2022October 16, 2025 Securonix

Researchers analyze CrowdStrike’s Adversary Quest 2022 CATAPULT SPIDER track, which centers on a Dogecoin-driven ransomware campaign leveraging CHM phishing, encoded PowerShell, and a Dogecoin-based C2. The storyline uncovers multi-stage payloads, a vulnerable…

Read More
Threat Research

IPFS: The New Hotbed of Phishing

July 24, 2022October 18, 2025 Securonix

IPFS is being used as a new platform for phishing, hosting content across a decentralized network and complicating takedowns. The article surveys IPFS phishing URLs, highlighting the services attackers abuse (Infura IPFS, Filebase/IPFS, NFT Storage, Surge.sh) …

Read More
Threat Research

Crypto stealing campaign spread via fake cracked software

May 26, 2022October 16, 2025 Securonix

The FakeCrack campaign lures users with fake cracked software and delivers a crypto-stealing malware that collects browser data, crypto wallets, and other sensitive information. It relies on a broad delivery infrastructure, password-protected ZIP payloads, and…

Read More
Threat Research

Closing the Door DeadBolt Ransomware Locks Out Vendors With Multitiered Extortion Scheme

May 23, 2022October 13, 2025 Securonix

DeadBolt ransomware targeted NAS devices (notably QNAP and ASUSTOR) with a multitiered extortion scheme that includes both victim and vendor payout options and a web-based ransom interface. The report highlights DeadBolt’s configuration-driven, automated appro…

Read More
Threat Research

Lazarus Trojanized DeFi app for delivering malware

March 23, 2022October 15, 2025 Securonix

A Lazarus threat actor campaign used a Trojanized DeFi application to deliver a full-featured backdoor, targeting cryptocurrency and DeFi services through multi-stage C2 infrastructure hosted on South Korean servers. The backdoor communicates via HTTP with RC4…

Read More

Posts pagination

Previous 1 … 43 44 45 Next

What are you looking for ?

  • 🖥️ [ D A S H B O A R D ]
  • 🕵️‍♂️ Threat Research
  • 📰 Security News
  • 🚨 Attack & Data Breach
  • 🛑 Ransomware Monitor
  • 💀 Hacked! Web Defacement
  • ✨ Interesting Stuff
  • 📺 Youtube Overview
  • 🔍 Google Cybersecurity
  • 📢 Telegram Notification
  • 📰 News Daily Recap
  • 📰 Security Report
Twitter/X @TweetThreatNews
Facebook @Cybersecurity
LinkedIn Hendry Adrian

Website Disclaimer

Proudly powered by WordPress | Theme: Fairy Dark by Candid Themes.