WordPress Sites Hacked with Fake Cloudflare DDoS Alerts
Blog DDoS protection pages typically verify whether the site visitor is actually a human or part of a Distributed Denial of Service (DDoS) attack or other unwanted bot. Bad bots make up a large portion of web traffic. These include DDoS traffic, scrapers scavenging email addresses to send spam, bots trying to find vulnerable websites […]
CISA Warning Against Active Exploitation of Palo Alto Networks’ PAN-OS Vulnerability
Blog CISA added Palo Alto Networks PAN-OS to its Catalog of Known Exploited Vulnerabilities based on evidence of active exploitation This critical vulnerability is tracked with code CVE-2022-0028 (CVSS: 8.6 High). The vulnerability is the misconfiguration of a URL filtering policy. Misconfiguration of the PAN-OS URL filtering policy could allow a network-based attacker to perform […]
Iranian Threat Actor MERCURY Exploits Log4j 2 Vulnerabilities in Unpatched Systems
Blog The Microsoft Threat Intelligence Center (MSTIC) and Microsoft 365 Defender Research Team found that Iran-based threat actor MERCURY exploited Log4j 2 vulnerabilities in SysAid applications. The threat actor targets organizations that are all based in Israel. After gaining access, MERCURY maintains persistence, flushes credentials, and moves laterally within the targeted organization using both proprietary […]
LastPass Password Manager with 25 Million Users Hacked
Blog LastPass, one of the world’s largest password managers, has confirmed that it has been hacked. The company revealed that threat actors stole some of the company’s source code and some proprietary LastPass technical information. It was also stated that there is no evidence yet that this incident involved any access to customer data or […]
The fake ‘Internet Download Manager’ Chrome Extension Has Been Downloaded Over 200,000 Times
Blog The adware ‘Internet Download Manager’ Google Chrome extension has been installed by more than 200,000 users. According to reviews, this extension has been on the Chrome Web Store since June 2019. The extension has been observed to exhibit undesirable behavior. For example, opening links to spammy sites, changing the default browser search engine. According […]
Chinese Threat Actors APT40 Targets Energy Sector in Australia and the South China Sea
Blog The Chinese state-owned threat actor, APT40, targets Australian government agencies, Australian media companies and manufacturers that maintain wind turbine fleets in the South China Sea. Cybersecurity firm Proofpoint, which works in collaboration with PwC, said the threat actor sent phishing emails impersonating the latest campaigns, fake Australian Morning News and Australian media outlets. The […]
Akira: Undetectable Stealer Unleashed
Blog Introduction A new Stealer named Akira has been put up for sale on Telegram. It has the following features: Password grabber Cookies grabber Bookmarks grabber Crypto wallets and 2fa extensions dump (Grabs 💸 Zcash, 🚀 Armory, 📀 Bytecoin, 💵 Jaxx, 💎 Exodus desktop/extension, 📉 Ethereum, 🔨 Electrum, 🕹 AtomicWallet, 💹 Guarda, ⚡️ Coinbase, 🦊 […]
TA558 APT Group Uses Malicious Microsoft Compiled HTML Help Files
Blog Who is TA558? TA558, a financially-motivated cybercrime group, has been targeting the hospitality, travel, and related industries located in Latin America, North America, and Western Europe since 2018. The group sends malicious emails in Portuguese, Spanish, and sometimes English, using lures related to reservations and business themes such as hotel bookings. The emails may […]
Phishing Attack Targeting Turkish Companies
Blog Phishing mail targeting Turkish companies has been detected. Mail attachment contains an RFQ file. Normally, a request for quotation (RFQ) is a company’s document to request pricing and packaging information from a potential supplier. This RFQ-looking file is actually a RAR file. It contains a malicious EXE file that is simply a Keylogger and […]
What is “Cyber Threat”?
Blog The “cyber threat” refers to actions that are deemed malicious and are carried out deliberately or inadvertently by; hackers, criminals, business rivals, spies, dissatisfied workers, organized crime groups, and hactivist societies, in order to obtain unauthorized access, interrupt infrastructure, intercept classified data, and/or share data with third parties. Phishing, 0-day attacks, APT (Advanced Persistent […]