NodeStealer Malware Targets Facebook Ad Accounts, Harvesting Credit Card Data

November 21, 2024 at 01:48AM Threat hunters report an updated Python NodeStealer targeting Facebook Ads Manager and web browser credit card data. Developed by Vietnamese actors, it uses advanced techniques for data exfiltration, including avoiding detection in Vietnam. Recent phishing campaigns deploy I2Parcae RAT via ClickFix techniques, endangering users’ security and financial stability. ### Meeting … Read more

Ngioweb Botnet Fuels NSOCKS Residential Proxy Network Exploiting IoT Devices

November 19, 2024 at 09:42AM The Ngioweb malware powers the NSOCKS residential proxy service, with 80% of its bots originating from the Ngioweb botnet. This operation, involving over 20,000 IoT devices, allows users to proxy malicious traffic globally, facilitating attacks while obscuring identities. The underground proxy market is expected to grow significantly. ### Meeting Takeaways: … Read more

New Stealthy BabbleLoader Malware Spotted Delivering WhiteSnake and Meduza Stealers

November 18, 2024 at 12:57PM Researchers have identified a new malware loader called BabbleLoader, designed to evade detection and deliver information stealers like WhiteSnake and Meduza. It employs various evasion techniques, including runtime resolution and unique code for each sample, complicating analysis. This loader highlights the growing complexity of malware delivery methods. **Meeting Takeaways – … Read more

THN Recap: Top Cybersecurity Threats, Tools, and Practices (Nov 11 – Nov 17)

November 18, 2024 at 07:03AM Cybercriminals are increasingly exploiting vulnerabilities and human trust, affecting everyone and every organization. Recent threats include a zero-day flaw in Palo Alto firewall, hijacked domains, and phishing job offers targeting LinkedIn users. To defend against attacks, regular system updates and cybersecurity awareness are essential. ### Meeting Takeaways – Cybersecurity / … Read more

Inside Water Barghest’s Rapid Exploit-to-Market Strategy for IoT Devices

November 18, 2024 at 04:27AM Water Barghest, estimated to control over 20,000 IoT devices by October 2024, exploits vulnerabilities to monetize them as proxies on a marketplace. Utilizing automated scripts and the Ngioweb malware, the process from infection to marketplace availability can be completed in under 10 minutes, highlighting its operational efficiency. **Meeting Notes Takeaways: … Read more

Warning: DEEPDATA Malware Exploiting Unpatched Fortinet Flaw to Steal VPN Credentials

November 16, 2024 at 02:24AM A threat actor named BrazenBamboo has exploited a zero-day vulnerability in Fortinet’s FortiClient for Windows to extract VPN credentials using a tool called DEEPDATA. Discovered by Volexity, this malware, used in cyber espionage, is part of a broader framework encompassing various communication platforms and data exfiltration capabilities. ### Meeting Takeaways … Read more

Iranian Hackers Deploy WezRat Malware in Attacks Targeting Israeli Organizations

November 15, 2024 at 01:00PM Cybersecurity company Check Point has identified a remote access trojan named WezRat, attributed to Iranian state-sponsored hackers. It enables malicious activities like keylogging and file uploads. Distributed via phishing emails mimicking Israeli authorities, WezRat shows ongoing development, indicating significant investment in cyber espionage targeting various global entities. ### Meeting Takeaways: … Read more

New RustyAttr Malware Targets macOS Through Extended Attribute Abuse

November 14, 2024 at 04:57AM A new malware, RustyAttr, has been linked to the North Korean Lazarus Group, utilizing macOS file extended attributes to execute attacks. Disguised as legitimate applications, it uses distractions like error messages and fake PDFs. Protection remains effective on macOS systems, but social engineering may still be needed to bypass safeguards. … Read more

Toolkit Vastly Expands APT41’s Surveillance Powers

November 13, 2024 at 05:58PM China’s APT41 threat group has developed a sophisticated Windows-based malware toolkit, “DeepData Framework,” targeting South Asian organizations. The toolkit includes 12 modular plug-ins for data theft, including communications and system information. Analysts emphasize the need for heightened security measures against APT41’s ongoing cyber-espionage campaigns. ### Meeting Takeaways: 1. **APT41 Threat … Read more

China’s Volt Typhoon crew and its botnet surge back with a vengeance

November 12, 2024 at 08:01PM China’s Volt Typhoon cyber group has resurfaced, compromising outdated Cisco and Netgear routers to target critical U.S. infrastructure, sparking cyberattacks. Despite previous claims of dismantling the botnet, researchers report increased sophistication, with breaches extending to Singapore Telecommunications. The resurgence highlights rising Chinese cyber espionage threats globally. ### Meeting Takeaways on … Read more