The fake ‘Internet Download Manager’ Chrome Extension Has Been Downloaded Over 200,000 Times

Blog The fake ‘Internet Download Manager’ Chrome extension, masquerading as a legitimate tool, has been downloaded over 200,000 times. The fake Chrome extension The adware ‘Internet Download Manager’ Google Chrome extension has been installed by more than 200,000 users. According to reviews, this extension has been on the Chrome Web Store since June 2019. The […]
Chinese Threat Actors APT40 Targets Energy Sector in Australia and the South China Sea

Blog APT40, a Chinese state-sponsored hacking group, targets Energy Sector in Australia and the South China Sea. Chinese Threat Actors APT40 The Chinese state-owned threat actor, APT40, targets Australian government agencies, Australian media companies and manufacturers that maintain wind turbine fleets in the South China Sea. Cybersecurity firm Proofpoint, which works in collaboration with PwC, […]
Akira: Undetectable Stealer Unleashed

Blog Introduction A new Stealer named Akira has been put up for sale on Telegram. It has the following features: Password grabber Cookies grabber Bookmarks grabber Crypto wallets and 2fa extensions dump (Grabs 💸 Zcash, 🚀 Armory, 📀 Bytecoin, 💵 Jaxx, 💎 Exodus desktop/extension, 📉 Ethereum, 🔨 Electrum, 🕹 AtomicWallet, 💹 Guarda, ⚡️ Coinbase, 🦊 […]
TA558 APT Group Uses Malicious Microsoft Compiled HTML Help Files

Blog The TA558 APT advanced persistent threat group has been observed utilizing malicious Microsoft Compiled HTML Help (.chm) files to deliver malware payloads, targeting sectors such as hospitality and travel. Who is TA558 APT? TA558, a financially-motivated cybercrime group, has been targeting the hospitality, travel, and related industries located in Latin America, North America, and […]
Phishing Attack Targeting Turkish Companies

Blog Phishing Attack Targeting Turkish Companies: Turkish companies have been targeted by a phishing campaign involving emails with malicious attachments disguised as RFQ files. Phishing Attack Phishing mail targeting Turkish companies has been detected. Mail attachment contains an RFQ file. Normally, a request for quotation (RFQ) is a company’s document to request pricing and packaging […]
What is “Cyber Threat”?

Blog The “cyber threat” refers to actions that are deemed malicious and are carried out deliberately or inadvertently by; hackers, criminals, business rivals, spies, dissatisfied workers, organized crime groups, and hactivist societies, in order to obtain unauthorized access, interrupt infrastructure, intercept classified data, and/or share data with third parties. Phishing, 0-day attacks, APT (Advanced Persistent […]
Who is DarkSide Ransomware Group?

Blog Who is DarkSide Ransomware Group? FBI claims attack on the Colonial Pipeline has been attributed to DarkSide Ransomware, a kind of new ransomware family that emerged on the crimeware market at the beginning of November 2020. DarkSide is a Ransomware-as-a-Service with the stated goal of targeting ‘large corporations.’ They are primarily focused on recruiting […]
REvil Ransomware Malware Analysis

Blog REvil ransomware Dive into the technical analysis of REvil ransomware, detailing its encryption methods, attack vectors, and the strategies. 1. Overall Summary The REvil (also known as Sodinokibi) is a Ransomware-as-a-Service (RaaS). The first attack of REvil in the middle of April 2019, got huge attention from the Cyber Security world due to sharing […]
PetitPotam (MS-EFSRPC) Exploit – CVE2021-36942

Blog PetitPotam (MS-EFSRPC) Exploit – Summary PetitPotam Exploit needs Active Directory Certificate Services, specifically the default settings behind the Web Enrollment service because of this Vulnerability. Adversaries can achieve full Domain Admin (DC) takeover of a target Active Directory by using PetitPotam, which takes attention among Ransomware Gangs, they are able to use this Vulnerability […]
FluBot Android Malware Technical Analysis

Blog Explore FluBot Android Malware Technical Analysis, known for stealing sensitive data through SMS phishing and remote access capabilities. FluBot Android Malware The FluBot it’s an Android malware that targets Android devices and spreads to victims via phishing SMS messages that contain a malicious link to download the FluBot app. Victims click on this link […]