Law Enforcement Operation Targets Infostealers

Law Enforcement Operation Targets Infostealers

In a sweeping international effort, the U.S. Department of Justice, the Federal Bureau of Investigation, and multiple global law enforcement agencies have exposed “Operation Magnus,” targeting two of the world’s most notorious information-stealing malware networks, RedLine Stealer and META. According to a press release published on Oct. 29, the operation led to the seizure of multiple servers, the unsealing of charges against a RedLine Stealer developer, and the arrest of two suspects in Belgium. RedLine…

Read More

Zscaler Report: Mobile, IoT, and OT Cyber Threats Surge in 2024

Zscaler Report: Mobile, IoT, and OT Cyber Threats Surge in 2024

A new report from cloud security company Zscaler sheds light on the growing mobile threats on Android operating systems, as well as IoT and OT devices threats. The findings come as more than 60% of the global Internet traffic is now generated by mobile devices and financially-oriented mobile threats have grown by 111% over the last year. A list of mobile malware threats Zscaler’s ThreatLabz witnessed a 29% rise in banking mobile malware over the…

Read More

What is malware and why should I be concerned? | McAfee Blog

What is malware and why should I be concerned? | McAfee Blog

What is malware? A dictionary-like definition is “malicious software that attacks computers, smartphones, and other connected devices.” In fact, “malware” is a mash-up of “malicious software.” It describes any type of software or code specifically designed to exploit a connected device or network without consent. And, unsurprisingly, hackers design most of it for financial gain. What kinds of malware are there? Think of malware as an umbrella term that covers an entire host of “bad…

Read More

Timeline: Top 15 Notable Cyberattacks and Data Breaches

Timeline: Top 15 Notable Cyberattacks and Data Breaches

Cyberattacks, whether accidental or purposeful, have been a threat long before the invention of the World Wide Web. These attacks aim to steal money, data, or resources — and sometimes serve as tools for gaining an edge over rival nations. Each incident is a stark reminder for businesses to fortify their digital defenses while also underscoring the crucial role of security teams that work tirelessly to identify and neutralize these threats. The following attacks had…

Read More

Podcast bait, malware switch.

Podcast bait, malware switch.

Joshua Miller from Proofpoint is discussing their work on “Best Laid Plans: TA453 Targets Religious Figure with Fake Podcast Invite Delivering New BlackSmith Malware Toolset.” Proofpoint identified Iranian threat actor TA453 targeting a prominent Jewish figure with a fake podcast interview invitation, using a benign email to build trust before sending a malicious link. The attack attempted to deliver new malware called BlackSmith, containing a PowerShell trojan dubbed AnvilEcho, designed for intelligence gathering and exfiltration….

Read More

RATs in the tunnel: Uncovering the cyber underworld.

RATs in the tunnel: Uncovering the cyber underworld.

Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is Selena Larson, Proofpoint intelligence analyst and host of their podcast DISCARDED. Inspired by the residents of a building in New York’s exclusive upper west side, Selena is joined by N2K Networks Dave Bittner and Rick Howard to uncover the stories behind notable cyberattacks.  Being a security researcher is…

Read More

Detecting and preventing account takeover (ATO) attacks

Detecting and preventing account takeover (ATO) attacks

Account takeover (ATO) occurs when cybercriminals exploit stolen login credentials to gain unauthorized access to online accounts. ATOs can target people within organizations to steal sensitive information or customer accounts to enable fraudulent transactions. Given that ATO attacks have increased by 354% since 2023, having a strong prevention strategy is more crucial than ever to reduce risks for both customers and businesses. What is an account takeover (ATO) attack? ATO attacks can affect any organization…

Read More

Criminals Use Malware to Steal Near Field Communication Data

Criminals Use Malware to Steal Near Field Communication Data

Recent research by cybersecurity company ESET provides details about a new attack campaign targeting Android smartphone users. The cyberattack, based on both a complex social engineering scheme and the use of a new Android malware, is capable of stealing users’ near field communication data to withdraw cash from NFC-enabled ATMs. Constant technical improvements from the threat actor As noted by ESET, the threat actor initially exploited progressive web app technology, which enables the installation of…

Read More

Threat Actors Increasingly Target macOS

Threat Actors Increasingly Target macOS

Intel471’s new report reveals macOS is increasingly targeted by threat actors, who develop specific malware for the operating system or use cross-platform languages to achieve their goals on macOS computers. More macOS vulnerabilities are also being exploited in the wild. Malware and exploits might be used for both cybercrime and cyberespionage. More malware than ever on macOS Between January 2023 and July 2024, the researchers observed more than 40 threat actors targeting macOS systems with…

Read More

StormBamboo Compromises ISP to Spread Malware via Updates

StormBamboo Compromises ISP to Spread Malware via Updates

New research from cybersecurity company Volexity revealed details about a highly sophisticated attack deployed by a Chinese-speaking cyberespionage threat actor named StormBamboo. StormBamboo compromised an ISP to modify some DNS answers to queries from systems requesting legitimate software updates. Multiple software vendors were targeted. The altered responses led to malicious payloads served by StormBamboo in addition to the legitimate update files. The payloads targeted both macOS and Microsoft Windows operating systems. Who is StormBamboo? StormBamboo…

Read More
1 2 3 23