Cyware Alerts - Hacker News

Matanbuchus Loader: A New Malware-as-a-Service

Matanbuchus Loader: A New Malware-as-a-Service - Cybersecurity news
Researchers identified a threat actor targeting multiple organizations including large universities and high schools in the U.S., along with high-tech organizations in Belgium.

Ferocious Kitten Uses MarkiRAT to Target Iranian Regime

Ferocious Kitten Uses MarkiRAT to Target Iranian Regime - Cybersecurity news
An APT group based out of Iran is actively targeting Iranian users to deliver MarkiRAT that records keystrokes and clipboard content. Two suspicious documents related to it were uploaded to VirusTotal. It appears attackers are trying to enhance their arsenal with new tools to make their attack ... Read More

Scammers Using Tampered Ledger Devices to Steal Cryptocurrency

Scammers Using Tampered Ledger Devices to Steal Cryptocurrency - Cybersecurity news
Users and security experts have uncovered a scam involving the delivery of fake replacement Ledger devices to customers to steal cryptocurrency. Customers using Ledger devices are recommended to beware of any unwanted email, package, or text.

VPN Attacks: A Rising Threat for Remote Work in the COVID-19 Era

VPN Attacks: A Rising Threat for Remote Work in the COVID-19 Era - Cybersecurity news
In a recent report, Nuspire revealed that attacks against Fortinet’s SSL-VPN had jumped to 1,916% in the first quarter of 2021. It was also identified that there was a 1,527% spike in attacks against Pulse Secure VPN.

BackdoorDiplomacy - Trouble Brewing in Africa and the Middle East

BackdoorDiplomacy - Trouble Brewing in Africa and the Middle East - Cybersecurity news
The APT group is capable of stealing victims’ system information, take screenshots, and write, move, or delete files. A subset of the victims were targeted with data collection executables that sought out removable media.

Gold Winter is the Group Behind Hades Ransomware

Gold Winter is the Group Behind Hades Ransomware - Cybersecurity news
Researchers took the wraps off the operators of the Hades ransomware as they came across a new adversary group Gold Winter, whose behavior coincides with the former. The recent finding suggests that threat actors may be deliberately trying to find ways to look different or evolve their attack techn ... Read More

Paradise Ransomware’s Source Code Now Available on a Hacker Forum

Paradise Ransomware’s Source Code Now Available on a Hacker Forum - Cybersecurity news
Experts are concerned as the source code of the .NET version of Paradise ransomware was found to have been leaked on a hacker forum. Such leaks could prove to be devastating as any interested attacker can create their own ransomware version to target victims. 

Avaddon Ransomware Calls it Quit, Distributes Keys for Free

Avaddon Ransomware Calls it Quit, Distributes Keys for Free - Cybersecurity news
The Avaddon ransomware gang has shared 2,934 decryption keys , with Bleeping Computer, shrouded in an anonymous tip pretending to be from the FBI. The team soon shared it with Emsisoft, who confirmed the legitimacy of the keys.

Cryptocurrency and Ransomware Attacks - What's the Connection?

Cryptocurrency and Ransomware Attacks - What's the Connection? - Cybersecurity news
Cryptocurrencies are an extortionist’s dream come true. It is very difficult to trace adversaries based on bitcoin addresses. Moreover, bitcoin has become essential on the dark web as it is easy to acquire and use.

SolarMarker - The RAT with a Poisonous Trail

SolarMarker - The RAT with a Poisonous Trail - Cybersecurity news
Attackers behind SolarMarker were spotted using SEO keywords in PDF documents to boost the visibility of malicious links on search engines. A misled victim can be robbed of their personal data and credentials from browsers. Therefore, security professionals need to keep a strict eye on this evolvin ... Read More

Defend Against Threats with Cyber Fusion

Cyware is the leading provider of cyber fusion solutions that power threat intelligence sharing , end-to-end automation and 360-degree threat response.

Trending Tags