FreshRSS

πŸ”’
❌ Secure Planet Training Courses Updated For 2019 - Click Here
There are new available articles, click to refresh the page.
☐ β˜† βœ‡ The Hacker News

Stealthy BLOODALCHEMY Malware Targeting ASEAN Government Networks

By: Newsroom β€” May 24th 2024 at 09:13
Cybersecurity researchers have discovered that the malware known as BLOODALCHEMY used in attacks targeting government organizations in Southern and Southeastern Asia is in fact an updated version of Deed RAT, which is believed to be a successor to ShadowPad. "The origin of BLOODALCHEMY and Deed RAT is ShadowPad and given the history of ShadowPad being utilized in numerous APT
☐ β˜† βœ‡ The Hacker News

Russian Hackers Use 'WINELOADER' Malware to Target German Political Parties

By: Newsroom β€” March 23rd 2024 at 06:03
The WINELOADER backdoor used in recent cyber attacks targeting diplomatic entities with wine-tasting phishing lures has been attributed as the handiwork of a hacking group with links to Russia's Foreign Intelligence Service (SVR), which was responsible for breaching SolarWinds and Microsoft. The findings come from Mandiant, which said Midnight Blizzard (aka APT29, BlueBravo, or
☐ β˜† βœ‡ The Hacker News

Beware: Malicious Google Ads Trick WinSCP Users into Installing Malware

By: Newsroom β€” November 17th 2023 at 13:31
Threat actors are leveraging manipulated search results and bogus Google ads that trick users who are looking to download legitimate software such as WinSCP into installing malware instead. Cybersecurity company Securonix is tracking the ongoing activity under the nameΒ SEO#LURKER. β€œThe malicious advertisement directs the user to a compromised WordPress website gameeweb[.]com, which redirects the
☐ β˜† βœ‡ The Hacker News

Quasar RAT Leverages DLL Side-Loading to Fly Under the Radar

By: Newsroom β€” October 23rd 2023 at 07:58
The open-source remote access trojan known asΒ Quasar RATΒ has been observed leveraging DLL side-loading to fly under the radar and stealthily siphon data from compromised Windows hosts. "This technique capitalizes on the inherent trust these files command within the Windows environment," Uptycs researchers Tejaswini Sandapolla and Karthickkumar KathiresanΒ saidΒ in a report published last week,
☐ β˜† βœ‡ The Hacker News

Dragon Breath APT Group Using Double-Clean-App Technique to Target Gambling Industry

By: Ravie Lakshmanan β€” May 6th 2023 at 11:24
An advanced persistent threat (APT) actor known asΒ Dragon BreathΒ has been observed adding new layers of complexity to its attacks by adopting a novelΒ DLL side-loadingΒ mechanism. "The attack is based on a classic side-loading attack, consisting of a clean application, a malicious loader, and an encrypted payload, with various modifications made to these components over time," Sophos researcher
❌