FreshRSS

πŸ”’
❌ Secure Planet Training Courses Updated For 2019 - Click Here
There are new available articles, click to refresh the page.
☐ β˜† βœ‡ The Hacker News

How Do Hackers Blend In So Well? Learn Their Tricks in This Expert Webinar

By: The Hacker News β€” May 24th 2024 at 11:49
Don't be fooled into thinking that cyber threats are only a problem for large organizations. The truth is that cybercriminals are increasingly targeting smaller businesses, and they're getting smarter every day. Join our FREE webinar "Navigating the SMB Threat Landscape: Key Insights from Huntress' Threat Report," in which Jamie Levy β€” Director of Adversary Tactics at Huntress, a renowned
☐ β˜† βœ‡ The Hacker News

Alert: Water Curupira Hackers Actively Distributing PikaBot Loader Malware

By: Newsroom β€” January 9th 2024 at 16:01
A threat actor called Water Curupira has been observed actively distributing the PikaBot loader malware as part of spam campaigns in 2023. β€œPikaBot’s operators ran phishing campaigns, targeting victims via its two components β€” a loader and a core module β€” which enabled unauthorized remote access and allowed the execution of arbitrary commands through an established connection with
☐ β˜† βœ‡ The Hacker News

QakBot Malware Resurfaces with New Tactics, Targeting the Hospitality Industry

By: Newsroom β€” December 18th 2023 at 09:29
A new wave of phishing messages distributing the QakBot malware has been observed, more than three months after a law enforcement effort saw its infrastructure dismantled by infiltrating its command-and-control (C2) network. Microsoft, which made the discovery, described it as a low-volume campaign that began on December 11, 2023, and targeted the hospitality industry. "Targets
☐ β˜† βœ‡ The Hacker News

Microsoft Warns of Malvertising Scheme Spreading CACTUS Ransomware

By: Newsroom β€” December 4th 2023 at 04:20
Microsoft has warned of a new wave of CACTUS ransomware attacks that leverage malvertising lures to deploy DanaBot as an initial access vector. The DanaBot infections led to "hands-on-keyboard activity by ransomware operator Storm-0216 (Twisted Spider, UNC2198), culminating in the deployment of CACTUS ransomware," the Microsoft Threat Intelligence team said in a series of posts on X (
☐ β˜† βœ‡ The Hacker News

Qakbot Takedown Aftermath: Mitigations and Protecting Against Future Threats

By: The Hacker News β€” December 1st 2023 at 10:50
The U.S. Department of Justice (DOJ) and the FBI recently collaborated in a multinational operation to dismantle the notorious Qakbot malware and botnet. While the operation was successful in disrupting this long-running threat, concerns have arisen as it appears that Qakbot may still pose a danger in a reduced form. This article discusses the aftermath of the takedown, provides mitigation
☐ β˜† βœ‡ The Hacker News

DarkGate and PikaBot Malware Resurrect QakBot's Tactics in New Phishing Attacks

By: Newsroom β€” November 20th 2023 at 14:50
Phishing campaigns delivering malware families such as DarkGate and PikaBot are following the same tactics previously used in attacks leveraging the now-defunct QakBot trojan. β€œThese include hijacked email threads as the initial infection, URLs with unique patterns that limit user access, and an infection chain nearly identical to what we have seen with QakBot delivery,” CofenseΒ saidΒ in a report
☐ β˜† βœ‡ The Hacker News

QakBot Threat Actors Still in Action, Using Ransom Knight and Remcos RAT in Latest Attacks

By: Newsroom β€” October 5th 2023 at 13:18
Despite the disruption to its infrastructure, the threat actors behind the QakBot malware have been linked to an ongoing phishing campaign since early August 2023 that led to the delivery of Ransom Knight (aka Cyclops) ransomware and Remcos RAT. This indicates that β€œthe law enforcement operation may not have impacted Qakbot operators’ spam delivery infrastructure but rather only their
☐ β˜† βœ‡ The Hacker News

FBI Dismantles QakBot Malware, Frees 700,000 Computers, Seizes $8.6 Million

By: THN β€” August 30th 2023 at 04:05
A coordinated law enforcement effort codenamedΒ Operation Duck HuntΒ has felledΒ QakBot, a notorious Windows malware family that's estimated to have compromised over 700,000 computers globally and facilitated financial fraud as well as ransomware. To that end, the U.S. Justice Department (DoJ)Β saidΒ the malware is "being deleted from victim computers, preventing it from doing any more harm," adding
☐ β˜† βœ‡ The Hacker News

QakBot Malware Operators Expand C2 Network with 15 New Servers

By: THN β€” August 8th 2023 at 14:15
The operators associated with the QakBot (aka QBot) malware have set up 15 new command-and-control (C2) servers as of late June 2023. The findings are a continuation of the malware's infrastructure analysis from Team Cymru, and arrive a little over two months after Lumen Black Lotus LabsΒ revealedΒ that 25% of its C2 servers are only active for a single day. "QakBot has a history of taking an
☐ β˜† βœ‡ The Hacker News

Evasive QBot Malware Leverages Short-lived Residential IPs for Dynamic Attacks

By: Ravie Lakshmanan β€” June 1st 2023 at 16:11
An analysis of the "evasive and tenacious" malware known as QBot has revealed that 25% of its command-and-control (C2) servers are merely active for a single day. What's more, 50% of the servers don't remain active for more than a week, indicating the use of an adaptable and dynamicΒ C2 infrastructure, Lumen Black Lotus Labs said in a report shared with The Hacker News. "This botnet has adapted
❌