Skip to content

Cybersecurity News Everyday

Stay Ahead of Cyber Threats – Daily Security Insights, Powered by AI

    • Cyber Attack & Data Breach
    • Daily Recap
    • Disclaimer
    • Hacked: Web Defacement
    • Security Report
    • Web Statistics
    • YouTube Overview
    • Welcome!
    • Threat Research
    • Security News
    • Ransom Monitor
    • Interesting Stuff

Tag: PRIVILEGE

Threat Research

Have Your Cake and Eat it Too? An Overview of UNC2891

March 10, 2022October 13, 2025 Securonix

UNC2891 uses in-memory droppers like STEELCORGI and STEELHOUND to decrypt or encrypt payloads via environment-keying, and operates a broad Unix/Linux toolkit (SUN4ME) for recon, enumeration, and exploitation. The group also deployed Linux/Unix keyloggers (WING…

Read More
Threat Research

Suspected Conti Ransomware Activity in the Auto Manufacturing Sector

March 9, 2022October 22, 2025 Securonix

Dragos reports sustained network chatter between Emotet C2 servers and multiple auto manufacturers, with the Emotet infrastructure suspected to be controlled by the Conti ransomware group. No confirmed initial access or encryption has been observed yet, and ac…

Read More
Threat Research

DirtyMoe: Worming Modules – Avast Threat Labs

March 9, 2022October 15, 2025 Securonix

DirtyMoe’s worming module autonomously spreads by exploiting several known vulnerabilities and by generating target IPs based on geolocation, enabling mass-scale infection and lateral movement. This Avast Threat Lab analysis details the worm’s kill chain, the …

Read More
Threat Research

Cyble – Deep Dive Analysis – Pandora Ransomware

March 8, 2022October 13, 2025 Securonix

Cyble’s deep-dive into Pandora ransomware unveils its encryption behavior, links to ROOK-like TTPs, and notable anti-analysis and cleanup techniques. The analysis details a UPX-packed, C++-compiled payload that uses mutexes, privilege escalation, ETW/AMSI evas…

Read More
Threat Research

Russian State-Sponsored Cyber Actors Gain Network Access by Exploiting Default Multifactor Authentication Protocols and “PrintNightmare” Vulnerability | CISA

March 8, 2022October 14, 2025 Securonix

FBI and CISA warn that Russian state-sponsored cyber actors gained network access by exploiting default MFA configurations and the PrintNightmare vulnerability, enabling document exfiltration from an NGO via compromised credentials and MFA bypass. The advisory…

Read More
Threat Research

New RURansom Wiper Targets Russia

March 1, 2022October 15, 2025 Securonix

RURansom is a wiper targeting Russia, not a ransomware variant, as encryption is irreversible. It spreads like a worm via removable disks and mapped network shares, encrypting files and dropping a wiper note, while some versions exhibit geo-targeting and obfus…

Read More
Threat Research

Does This Look Infected? A Summary of APT41 Targeting U.S. State Governments

February 28, 2022October 21, 2025 Securonix

APT41’s operations against U.S. state governments leveraged multiple, overlapping campaigns: initial access via a USAHerds web app vulnerability (CVE-2021-44207) followed by Log4Shell (CVE-2021-44228) deserialization to deploy backdoors, including KEYPLUG.LINU…

Read More
Threat Research

Fake Purchase Order Used to Deliver Agent Tesla | FortiGuard Labs 

February 28, 2022October 18, 2025 Securonix

FortiGuard Labs uncovered a phishing operation masquerading as a purchase order to a Ukrainian manufacturer, delivering Agent Tesla via a PPAM PowerPoint add-in. The campaign uses a multi-stage dropper with Bit.ly and MediaFire stages, ends with PowerShell-bas…

Read More
Threat Research

Qbot and Zerologon Lead To Full Domain Compromise

February 9, 2022October 15, 2025 Securonix

In a November 2021 intrusion, threat actors gained a foothold with Qbot (Quakbot) and used Zerologon to elevate to domain admin, enabling Cobalt Strike deployment and broader network compromise. They conducted AD discovery, exfiltrated sensitive documents, and…

Read More
Threat Research

EvilPlayout: Attack Against Iran’s State Broadcaster – Check Point Research

February 9, 2022October 20, 2025 Securonix

A Check Point Research analysis uncovers a coordinated IRIB cyberattack (Jan 2022) that hijacked state TV/radio playout, deployed backdoors, and used a wiper to disrupt broadcasting. The report details tools like SimplePlayout, Winscreeny, HttpCallbackService,…

Read More
Threat Research

Lockbit 2.0 Ransomware: TTPs Used in Emerging Ransomware Campaigns

February 3, 2022October 18, 2025 Picussecurity

Picus Security analyzes LockBit 2.0 ransomware, detailing its evolution as a RaaS operator, its anti-detection techniques, and its methods to disrupt victim recovery and logging. The post also lists IOCs and maps LockBit 2.0 behaviors to MITRE ATT&CK technique…

Read More
Threat Research

CoinStomp Malware Family Targets Asian Cloud Service Providers

January 31, 2022October 14, 2025 Securonix

Researchers from Cado Security uncovered CoinStomp, a Linux-based malware family targeting Asian Cloud Service Providers to mine cryptocurrency using a shell-script campaign. It employs timestomping, removal of cryptographic policies, and a /dev/tcp reverse sh…

Read More
Threat Research

Antlion: Chinese APT Uses Custom Backdoor to Target Financial Institutions in Taiwan

January 28, 2022October 16, 2025 Securonix

Antlion, a Chinese APT, deployed a custom .NET loader called xPack to compromise Taiwanese targets, focusing on financial and manufacturing organizations and conducting extended credential dumping and data staging. The operation used a mix of custom loaders an…

Read More
Threat Research

PrivateLoader: The first step in many malware schemes

January 28, 2022October 17, 2025 Securonix

PrivateLoader is used as a delivery framework to host Smokeloader payloads and other malware via PPI services, spanning multiple campaigns and payload families. It has facilitated deliveries of Qbot, Kronos, Trickbot, Dridex, Danabot, Vidar, and even Conti ran…

Read More
Threat Research

Zoom For You — SEO Poisoning to Distribute BATLOADER and Atera Agent

January 28, 2022October 17, 2025 Securonix

Mandiant ties a campaign that uses SEO poisoning to distribute BATLOADER and ATERA Agent to techniques disclosed after a CONTI ransomware affiliate leak in August 2021. The report also provides extensive indicators, a YARA rule, and a MITRE ATT&CK mapping span…

Read More

Posts pagination

Previous 1 … 304 305 306 Next

What are you looking for ?

  • 🖥️ [ D A S H B O A R D ]
  • 🕵️‍♂️ Threat Research
  • 📰 Security News
  • 🚨 Attack & Data Breach
  • 🛑 Ransomware Monitor
  • 💀 Hacked! Web Defacement
  • ✨ Interesting Stuff
  • 📺 Youtube Overview
  • 🔍 Google Cybersecurity
  • 📢 Telegram Notification
  • 📰 News Daily Recap
  • 📰 Security Report
Twitter/X @TweetThreatNews
Facebook @Cybersecurity
LinkedIn Hendry Adrian

Website Disclaimer

Proudly powered by WordPress | Theme: Fairy Dark by Candid Themes.