Share Blog Post
Two new malware loaders have been detected - Kardon and Aurora. While Aurora can allow cybercriminals to create botnets, Kardon comes equipped with a complete botshop. These new loaders have been advertised on lower-tier Russian-language forums since March and May respectively. Researchers believe that both loaders may follow SmokeLoader's path, ending up being sold on high-end Russian cybercrime forums.
A new exploit kit has been discovered, name Underminer, which distributes a cryptocurrency miner called Hidden Mellifera. The exploit kit is believed to be developed by the same cybercriminals behind the 2017 browser-hijacking malware Hidden Soul. Underminer transfer a malware to infected systems via TCP tunnels.
A new encrypted malware called GZipDe has been detected. The malware uses old macros to subvert system processes and enable backdoor device access. Users are urged to disable macros by default to protect devices from such malware.
Sim swap scams, which were widespread in the US and Europe, have now become increasingly common in India. In the current cases in India, victims are asked to share their Aadhaar number and forward a text message. Most of the recipients fall for the trick and fail to realize that the scammers already have their banking details. The attackers only need access to their OTPs to gain access to victims' banking credentials.
Users are advised to be cautious about calls on verification of any sort.
Colorado phishing scam
A phishing campaign was discovered targeting home improvement tradespeople in Boulder County, Colorado. The phishing email purports as coming from the Boulder County Government and contains a malicious attachment that contains link leads to a compromised site containing the phishing page. The campaign is designed to harvest victims' email credentials. The site hosting the phishing page has not been taken down, so it’s possible that people could still become victims.
Posted on: July 27, 2018
Get the Daily Threat Briefing delivered to your email!
More from Cyware
Stay updated on the security threat landscape and technology innovations at Cyware with our threat intelligence briefings and blogs.
Explore Industry Briefs
Cyware for Enterprise
Adopt next-gen security with threat intelligence analysis, security automation...
Cyware for ISACs/ISAOs
Anticipate, prevent, and respond to threats through bi-directional threat in...