New Glove infostealer malware bypasses Chrome’s cookie encryption

November 14, 2024 at 04:05PM The new Glove Stealer malware can bypass Google Chrome’s App-Bound encryption to steal cookies and sensitive information from various browsers and applications. It employs social engineering tactics similar to ClickFix infections and requires local admin privileges to operate. Analysts note its basic methods indicate it remains in early development. ### … Read more

Russian Hackers Exploit New NTLM Flaw to Deploy RAT Malware via Phishing Emails

November 14, 2024 at 01:33AM A newly patched Windows NT LAN Manager (NTLM) vulnerability (CVE-2024-43451) was exploited by a Russia-linked actor in attacks on Ukraine, enabling the theft of user hashes via infected documents. The attack involves phishing emails linking to malicious files, leading to potential financial theft within an hour of compromise. ### Meeting … Read more

Iranian Cybercriminals Target Aerospace Workers via LinkedIn

November 13, 2024 at 03:36PM A phishing campaign, attributed to Iranian threat actor TA455, targets aerospace professionals on LinkedIn by impersonating recruiters. Victims download a malicious zip file, leading to malware installation via DLL side-loading. The malware deploys Snail Resin and uses covert tactics to evade detection. Caution is advised for users in the aerospace … Read more

Hamas-Affiliated WIRTE Employs SameCoin Wiper in Disruptive Attacks Against Israel

November 13, 2024 at 11:22AM A Hamas-affiliated threat group, WIRTE, has escalated cyber operations from espionage to disruptive attacks targeting Israeli entities and other regional countries despite ongoing conflict. Their techniques include phishing campaigns and malware like the SameCoin wiper, reflecting their politically motivated activities throughout 2024. ### Meeting Takeaways: Threat Intelligence / Cyber Espionage … Read more

‘GoIssue’ Cybercrime Tool Targets GitHub Developers En Masse

November 12, 2024 at 12:52PM Researchers identified a tool named GoIssue on a cybercrime forum aimed at GitHub users for bulk credential theft and malicious activities. It automates email harvesting from GitHub profiles for phishing campaigns. Potentially linked to an earlier extortion campaign, it enhances risks for developers, urging vigilance against suspicious communications. ### Meeting … Read more

New Phishing Tool GoIssue Targets GitHub Developers in Bulk Email Campaigns

November 12, 2024 at 10:15AM Cybersecurity researchers warn of GoIssue, a tool for orchestrating large-scale phishing attacks on GitHub users by extracting emails from profiles. Marketed by a threat actor, it enables customized mass email campaigns, increasing risks of data theft and breaches. Additionally, a new two-step phishing attack uses compromised Microsoft files. ### Meeting … Read more

Revamped Remcos RAT Deployed Against Microsoft Windows Users

November 11, 2024 at 04:49PM Threat actors are using a modified Remcos RAT to exploit a Microsoft Windows vulnerability via phishing emails. The malware utilizes multiple script languages to evade detection and installs itself through a complex process. Experts emphasize the need for patch management, employee training, and endpoint protection as critical defenses against such … Read more

HIBP notifies 57 million people of Hot Topic data breach

November 11, 2024 at 04:31PM A data breach has exposed personal information of over 56 million customers from Hot Topic, Box Lunch, and Torrid. The stolen data includes names, emails, addresses, and credit card details. The breach, allegedly linked to a threat actor named “Satanic,” occurred around October 19, 2024. Customers are advised to stay … Read more

Flexible Structure of Zip Archives Exploited to Hide Malware Undetected

November 11, 2024 at 01:02PM Threat actors exploit zip file concatenation in phishing attacks, using it to hide Trojan malware like SmokeLoader undetected. Different zip readers handle concatenated files variably, impacting detection effectiveness. Users are advised to be cautious with unsolicited attachments, while enterprises should employ advanced security tools to uncover hidden threats within zip … Read more

Hackers now use ZIP file concatenation to evade detection

November 10, 2024 at 06:43PM Hackers are exploiting ZIP file concatenation to deliver malware undetected on Windows machines. This method involves merging multiple ZIP archives, camouflaging a trojan within a phishing email. Perception Point recommends security solutions capable of recursive unpacking and cautions against trusting emails with ZIP attachments to enhance protection. ### Meeting Takeaways … Read more