Invoice Phishing Alert: TA866 Deploys WasabiSeed & Screenshotter Malware

Invoice Phishing Alert: TA866 Deploys WasabiSeed & Screenshotter Malware

The threat actor tracked as TA866 has resurfaced after a nine-month hiatus with a new large-volume phishing campaign to deliver known malware families such as WasabiSeed and Screenshotter. The campaign, observed earlier this month and blocked by Proofpoint on January 11, 2024, involved sending thousands of invoice-themed emails targeting North America bearing decoy PDF files. “The PDFs contained OneDrive URLs that, if clicked, initiated a multi-step infection chain eventually leading to the malware payload, a…

Read More

Unveiling the power of external attack surface management

Unveiling the power of external attack surface management

Verizon’s latest data breach report shows that 83% of attacks are carried out by external actors, exploiting vulnerabilities in companies’ network perimeters. At the same time, Gartner has identified External Attack Surface Management (EASM) as the top cybersecurity trend for the coming 5 to 10 years. So, what exactly is EASM, and why is it gaining such global prominence?  EASM is a cybersecurity approach that involves continuously monitoring and assessing a company’s publicly accessible digital assets for vulnerabilities….

Read More

New Campaign Targets Middle East Governments with IronWind Malware

New Campaign Targets Middle East Governments with IronWind Malware

Nov 14, 2023NewsroomCyber Espionage / Threat Intelligence Government entities in the Middle East are the target of new phishing campaigns that are designed to deliver a new initial access downloader dubbed IronWind. The activity, detected between July and October 2023, has been attributed by Proofpoint to a threat actor it tracks under the name TA402, which is also known as Molerats, Gaza Cyber Gang, and shares tactical overlaps with a pro-Hamas hacking crew known as…

Read More

New ZenRAT Malware Targeting Windows Users via Fake Password Manager Software

New ZenRAT Malware Targeting Windows Users via Fake Password Manager Software

Sep 27, 2023THNMalware / Cyber Threat A new malware strain called ZenRAT has emerged in the wild that’s distributed via bogus installation packages of the Bitwarden password manager. “The malware is specifically targeting Windows users and will redirect people using other hosts to a benign web page,” enterprise security firm Proofpoint said in a technical report. “The malware is a modular remote access trojan (RAT) with information stealing capabilities.” ZenRAT is hosted on fake websites…

Read More

Sophisticated Phishing Campaign Targeting Chinese Users with ValleyRAT and Gh0st RAT

Sophisticated Phishing Campaign Targeting Chinese Users with ValleyRAT and Gh0st RAT

Sep 20, 2023THNMalware Attack / Cyber Threat Chinese-language speakers have been increasingly targeted as part of multiple email phishing campaigns that aim to distribute various malware families such as Sainbox RAT, Purple Fox, and a new trojan called ValleyRAT. “Campaigns include Chinese-language lures and malware typically associated with Chinese cybercrime activity,” enterprise security firm Proofpoint said in a report shared with The Hacker News. The activity, observed since early 2023, entails sending email messages containing…

Read More

Cybercriminals Renting WikiLoader to Target Italian Organizations with Banking Trojan

Cybercriminals Renting WikiLoader to Target Italian Organizations with Banking Trojan

Aug 01, 2023THNCyber Attack / Malware Organizations in Italy are the target of a new phishing campaign that leverages a new strain of malware called WikiLoader with an ultimate aim to install a banking trojan, stealer, and spyware referred to as Ursnif (aka Gozi). “It is a sophisticated downloader with the objective of installing a second malware payload,” Proofpoint said in a technical report. “The malware uses multiple mechanisms to evade detection and was likely…

Read More

Iranian Hackers’ Sophisticated Malware Targets Windows and macOS Users

Iranian Hackers’ Sophisticated Malware Targets Windows and macOS Users

Jul 06, 2023Ravie LakshmananEndpoint Security / Malware The Iranian nation-state actor known as TA453 has been linked to a new set of spear-phishing attacks that infect both Windows and macOS operating systems with malware. “TA453 eventually used a variety of cloud hosting providers to deliver a novel infection chain that deploys the newly identified PowerShell backdoor GorjolEcho,” Proofpoint said in a new report. “When given the opportunity, TA453 ported its malware and attempted to launch…

Read More

Security Chiefs Take On IT Roles as More Infrastructure Moves Online

Security Chiefs Take On IT Roles as More Infrastructure Moves Online

Stay-at-home orders during the Covid-19 pandemic spurred new cloud computing and remote-technology setups, increasing company exposure to hackers. As a result, some corporate cybersecurity chiefs are also taking on the leadership role for all of information technology. Oversight of both groups isn’t an easy line to walk.  Having spent years in general IT, these chief information security officers understand the cyber risks of an increasingly far-flung tech infrastructure, said Lucia Milică Stacy, global resident CISO…

Read More

Cybersecurity Chiefs Navigate AI Risks and Potential Rewards

Cybersecurity Chiefs Navigate AI Risks and Potential Rewards

Security chiefs say the benefits of artificial intelligence are clear, but that the promises and risks of early generative AI are overblown. Generative AI platforms such as OpenAI’s ChatGPT have gained attention for their ability to answer conversational questions, write essays and perform other tasks in humanlike ways. Security vendors are touting the benefits of the technology, saying it can augment human analysts by analyzing and distilling data from wildly different sources into a digestible…

Read More

Cybersecurity Leaders Suffer Burnout as Pressures of the Job Intensify

Cybersecurity Leaders Suffer Burnout as Pressures of the Job Intensify

Relentless cyberattacks and pressure to fix security gaps despite budget constraints are raising the stress levels of corporate cyber leaders and their worries about personal liability, a growing concern since the criminal case against Uber Technologies ’ former security chief. Hacks on companies’ IT systems often come with business disruptions, reputational damage, regulatory investigations and lawsuits. Chief information security officers must manage cybersecurity risks and, at the same time, educate C-suite colleagues and the board….

Read More
1 2 3 4 35