Computer Security
FBI Announces Cybercrime Caused Losses of Over $12.5 Billion in 2023
The FBI's Internet Crime Complaint Center (IC3) released its annual report for 2023, disclosing that the agency observed a nearly 10% surge in cybercrime complaints compared to the previous year. In 2023, cybercrime... Read more
CHAVECLOAK Banking Trojan Targets Brazil
CHAVECLOAK banking Trojan, a new cyber threat, is spreading its infection through SMS phishing (SMishing), phishing emails, and compromised websites. FortiGuard Labs, a cybersecurity research team, has identified a... Read more
Trojan:Win32/MpTamperBulkExcl.H Detection
Trojan:Win32/MpTamperBulkExcl.H is a heuristic identification handle created to broadly identify a Trojan Horse. The usual malicious actions exhibited by Trojans such as Trojan:Win32/MpTamperBulkExcl.H include, but... Read more
TimbreStealer Malware Exploits Tax Season
A highly sophisticated cybercrime campaign utilizing the 'Timbre Stealer' malware has been identified, targeting various industries nationwide. Initially discovered by Cisco Talos in November, the malicious activity... Read more
SSH-Snake Worm Built from Open-Sourced Legitimate Tool
A freshly open-sourced tool for network mapping known as SSH-Snake has been repurposed by malicious actors for illicit purposes. Sysdig researchers revealed that SSH-Snake, identified as a self-modifying worm,... Read more
Ukraine Targeted by Russian Misinformation and Data-Harvesting Attack
Security researchers have discovered a new 'influence operation' targeting Ukraine that utilizes spam emails to spread disinformation related to the war. The activity, known as Operation Texonto, has been linked to... Read more
Snake Infostealer Abuses Facebook Messages
Threat actors are utilizing Facebook messages to disseminate a Python-based data-stealing tool named Snake, designed to capture sensitive information and credentials. According to Cybereason researcher Kotaro Ogino,... Read more
GTPDOOR Malware Targets Linux Systems
Cyber investigators have detected a newly identified Linux malware named GTPDOOR, specifically engineered for deployment in proximity to GPRS roaming exchanges (GRX) within telecom networks. Notably, this malware... Read more
CVE-2024-23204 Apple's Shortcuts Vulnerability
Information has surfaced regarding a previously patched security vulnerability of high severity in Apple's Shortcuts app, which could enable a shortcut to access sensitive device data without user consent. The... Read more
IDAT Loader Strikes Ukrainian Targets in Finland
Ukrainian entities situated in Finland have fallen victim to a malicious campaign that involves the distribution of a commercial remote access trojan known as Remcos RAT. This campaign utilizes a malware loader named... Read more
US Posts New Bounty of $15 Million on the LockBit Ransomware Gang
The United States is offering substantial rewards for information regarding cybercriminals associated with the recently dismantled LockBit ransomware operation, but law enforcement agencies assert they have already... Read more
VietCredCare Stealer Targets Victims in Vietnam
Since at least August 2022, advertisers on Facebook in Vietnam have been targeted by an unknown information-stealing malware known as VietCredCare. This malicious software is noteworthy for its automatic filtering of... Read more
TODDLESHARK Malware Linked to Kimsuky APT
Recently, security vulnerabilities in ConnectWise ScreenConnect have been exploited by North Korean threat actors to introduce a new malware known as TODDLERSHARK. TODDLERSHARK shares similarities with known Kimsuky... Read more
CVE-2023-52160 Wi-Fi Vulnerability
Researchers in cybersecurity have detected two authentication bypass vulnerabilities in open-source Wi-Fi software used in Android, Linux, and ChromeOS devices. These flaws could deceive users into connecting to a... Read more
CVE-2024-1071 WordPress Plugin Vulnerability
A significant security vulnerability has been revealed in Ultimate Member, a widely used WordPress plugin boasting over 200,000 active installations. Identified as CVE-2024-1071, this flaw has earned a high CVSS score... Read more
Ousaban Banking Trojan Used in Phishing Attacks
Security experts are cautioning about a surge in email phishing attacks utilizing the Google Cloud Run service to distribute various banking trojans like Astaroth (also known as Guildma), Mekotio, and Ousaban (aka... Read more
DOPLUGS Backdoor Employed by Chinese Hackers
Mustang Panda, a threat actor with ties to China, has focused its cyber-espionage efforts on several Asian nations by employing a modified version of the PlugX (also known as Korplug) backdoor, named DOPLUGS.... Read more
Lockbit Gang Dismantled in International Police Operation
Interpol and the British National Crime Agency (NCA) have successfully penetrated Lockbit's systems and exfiltrated its data. As a notable ransomware group believed to operate from Russia, Lockbit is a major player in... Read more