🚨 Security Alert: The infamous malware loader and initial access broker, Bumblebee, has resurfaced after a four-month absence in a new phishing campaign observed in February 2024! 🦠🌐. All the details here: 🔗https://bit.ly/49m6WPA #WeHackYourSoftware #appsec #pentesting #devsecops #securitytesting #Cybersecurity #Phishing #Malware
Fluid Attacks’ Post
More Relevant Posts
-
☁️Cybercriminals are exploiting Cloudflare's TryCloudflare service to create one-time tunnels for malware delivery. These tunnels relay traffic from attacker-controlled servers to local machines, evading detection. The attack typically begins with a phishing email containing a ZIP archive that leads to a malicious Windows shortcut file hosted on a TryCloudflare-proxied WebDAV server. This method deploys various malware, including AsyncRAT and XWorm, using sophisticated techniques to bypass security tools. For more details, read the full article on The Hacker News. #CyberSecurity #Cloudflare #Malware #Phishing #TechNews
Cybercriminals Abusing Cloudflare Tunnels to Evade Detection and Spread Malware
thehackernews.com
To view or add a comment, sign in
-
Thank you Hacker News for covering the FROZEN#SHADOW threat advisory from Securonix Threat Research. The team discovered an ongoing domain takeover attack campaign leveraging SSLoad malware and RMM Software. The attack campaign resulted in the attackers being able to pivot and take over the entire network domain. SSLoad the primary vector used by threat actors is designed to stealthily infiltrate systems, gather sensitive information, and transmit its findings back to its operators. Once inside the system, SSLoad deploys multiple backdoors and payloads to maintain persistence and avoid detection. The malware is typically introduced into the system through phishing email campaigns. Based on gathered telemetry, victimology appears to be completely random, affecting targets in Asia, Europe, and the Americas. Read the advisory to see how the Threat Research team was able to observe the attackers installing RMM software, Cobalt Strike implants and moving laterally to other systems within the domain: https://lnkd.in/gwVZ_Nck
🚨 New Malware Alert: SSLoad is making waves with its sophisticated delivery via PhantomLoader. Discover the methods behind this #Malware-as-a-Service and its implications for your security. Read here: https://lnkd.in/gYZWBAn3 #cybersecurity
Cybercriminals Employ PhantomLoader to Distribute SSLoad Malware
thehackernews.com
To view or add a comment, sign in
-
🚨 New Malware Alert: SSLoad is making waves with its sophisticated delivery via PhantomLoader. Discover the methods behind this #Malware-as-a-Service and its implications for your security. Read here: https://lnkd.in/gYZWBAn3 #cybersecurity
Cybercriminals Employ PhantomLoader to Distribute SSLoad Malware
thehackernews.com
To view or add a comment, sign in
-
Can you trust that PDF? Cybercriminals are getting sneakier, turning everyday files into threats. Worse yet, they use business tools to spread their attacks. Dive into the details from InfoSecurity Magazine and stay informed! #CyberSecurity
PDF Malware on the Rise, Used to Spread WikiLoader, Ursnif and DarkGat
infosecurity-magazine.com
To view or add a comment, sign in
-
Another good example of the attack. Although your organization may continue to invest in email security tools, and education, please continue to be vigilant by only opening attachments that makes sense from the people you know. Even the people you know may have had their email compromised so it is important to use caution on both corporate and personal email accounts. Some of these attachments have embedded scripts that may bypass your defenses. #cybersecurityawareness #cybersecurity #malware #phishing #CISO #CTO #infosec #c2c #malware #emailsecurity #attachments #firstdefense
Attackers Using Obfuscation Tools to Deliver Multi-Stage Malware via Invoice Phishing
thehackernews.com
To view or add a comment, sign in
-
What is meant by "malware"? Malware, short for malicious software, refers to any software intentionally designed to cause damage, disrupt, or gain unauthorized access to computer systems. It encompasses various forms, including viruses, worms, Trojans, ransomware, and spyware. Bumblebee and Latrodectus are two types of malware: Bumblebee: This malware primarily targets Windows and Linux systems. It is often associated with the exploitation of vulnerabilities in software to facilitate unauthorized access, allowing attackers to execute commands and deploy additional malicious payloads. Latrodectus: Named after the black widow spider, Latrodectus is a type of malware that focuses on stealing sensitive information, often through keylogging or phishing techniques. Its design allows it to stealthily monitor user activity and transmit data back to the attacker. Keep yourself safe out there. #rayhaantechcare #TheHackerNews #cybersecurity #malware
⚠️ Two malware families, Bumblebee and Latrodectus, have resurfaced, leveraging advanced phishing campaigns after setbacks from Operation Endgame. Learn more: https://lnkd.in/g8m4WXT2 #cybersecurity #infosec #hacking
Bumblebee and Latrodectus Malware Return with Sophisticated Phishing Strategies
thehackernews.com
To view or add a comment, sign in
-
𝐕𝐈𝐄𝐇 𝐃𝐚𝐢𝐥𝐲 𝐓𝐡𝐫𝐞𝐚𝐭 𝐀𝐧𝐚𝐥𝐲𝐬𝐢𝐬 | 12 𝐉𝐮𝐧𝐞 2024 Top virus, malware and threat found in last 24 hours https://lnkd.in/dGWkCW8D #infosec #hacking #hacker #cybersecurity #hackersnews #bugbounty #bugbountytips
VIEH Daily Threat Analysis | 12 June 2024
https://viehgroup.com
To view or add a comment, sign in
-
𝗩𝗶𝘀𝘁𝗲𝗺 𝗦𝗼𝗹𝘂𝘁𝗶𝗼𝗻𝘀, 𝗜𝗻𝗰. - "Enhancing your business securely through innovation and technology." Vistem Solutions, Inc. is proud to be the exclusive IT Provider for Dispatch and DHA systems to the Ports of Long Beach and Los Angeles, other high-profile manufacturing and engineering networks, and healthcare companies demanding the highest level of service, security, and compliance. We want to help you enhance your business. #itprovider #security #compliance #vistemsolutions #MSSPContact us @ [email protected] Stay vigilant! Over 3,000 GitHub accounts have been compromised by the 'Stargazer Goblin' threat actors, who have created a sophisticated malware Distribution-as-a-Service (DaaS). This operation is pushing information-stealing malware through these fake accounts. Ensure your systems are protected and up-to-date. #cybersecurity #infosec #malware #dataprotection #ThreatAlert
Over 3,000 GitHub accounts used by malware distribution service
bleepingcomputer.com
To view or add a comment, sign in
-
𝗩𝗶𝘀𝘁𝗲𝗺 𝗦𝗼𝗹𝘂𝘁𝗶𝗼𝗻𝘀, 𝗜𝗻𝗰. - "Enhancing your business securely through innovation and technology." Vistem Solutions, Inc. is proud to be the exclusive IT Provider for Dispatch and DHA systems to the Ports of Long Beach and Los Angeles, other high-profile manufacturing and engineering networks, and healthcare companies demanding the highest level of service, security, and compliance. We want to help you enhance your business. #itprovider #security #compliance #vistemsolutions #MSSPContact us @ [email protected] Stay vigilant! Over 3,000 GitHub accounts have been compromised by the 'Stargazer Goblin' threat actors, who have created a sophisticated malware Distribution-as-a-Service (DaaS). This operation is pushing information-stealing malware through these fake accounts. Ensure your systems are protected and up-to-date. #cybersecurity #infosec #malware #dataprotection #ThreatAlert
Over 3,000 GitHub accounts used by malware distribution service
bleepingcomputer.com
To view or add a comment, sign in
-
What are Fileless Malwares? Traditional malware threats are no longer the only concern. A new breed of insidious & elusive threats has emerged, known as fileless malware. These sophisticated attacks exploit legitimate system tools & processes, leaving minimal footprints & evading traditional security measures. As cybercriminals continue to refine their techniques, understanding it has become crucial for organizations & individuals alike to safeguard their digital assets & maintain a robust cybersecurity posture. https://lnkd.in/gwATVUuZ #Malware #FilelessMalware #Cybersecurity #Threats
What are Fileless Malwares?
https://www.neumetric.com
To view or add a comment, sign in
11,601 followers