Tag: phishing
-
New XWorm RAT Campaign Leverages Phishing and CVE-2018-0802 Excel Exploit to Bypass Detection
Tags: attack, control, cve, cyber, cybercrime, data, ddos, detection, exploit, marketplace, phishing, ransomware, rat, theft, windowsXWorm, a multi-functional .NET”‘based RAT first observed in 2022, remains actively traded across cybercrime marketplaces and continues to attract both low-skilled and advanced operators thanks to its rich feature set and plugin-based architecture. Once deployed, it enables full remote control of compromised Windows systems, including data theft, remote desktop control, DDoS attacks, and ransomware execution.…
-
Adversaries Exploiting Proprietary AI Capabilities, API Traffic to Scale Cyberattacks
In the fourth quarter of 2025, the Google Threat Intelligence Group (GTIG) reported a significant uptick in the misuse of artificial intelligence by threat actors. According to GTIG’s AI threat tracker, what initially appeared as experimental probing has evolved into systematic, repeatable exploitation of large language models (LLMs) to enhance reconnaissance, phishing, malware development, and post-compromise…
-
‘Dead’ Outlook add-in hijacked to phish 4,000 Microsoft Office Store users
Tags: banking, breach, browser, chrome, control, credentials, credit-card, data, finance, google, infrastructure, malicious, marketplace, microsoft, office, password, phishingoutlook-one.vercel.app, hosted on the Vercel development platform, from which users download the software.”Microsoft reviews the manifest, signs it, and lists the add-in in their store. But the actual content the UI, the logic, everything the user interacts with is fetched live from the developer’s server every time the add-in opens,” said Koi Security’s researchers. By…
-
Neue Warn-App für Cybervorfälle gestartet
Die neue CYROS-App verknüpft Sicherheitswarnungen von Behörden und Fachquellen, um über Cybersicherheitsvorfälle zu informieren.Ransomware-Attacken, Phishing und digitale Sabotage: Vor dem Hintergrund der zunehmenden Cyberbedrohungslage hat das Frankfurter Cyberintelligence Institute (CII) ein digitales Warnsystem namens Cyber Risk”¯Observation”¯Service (CYROS) für Smartphones entwickelt.Die CYROS-App bündelt alle sicherheitsrelevanten Informationen aus behördlichen Warnmeldungen. Zu den Quellen zählen unter anderem das…
-
Outlook add-in goes rogue and steals 4,000 credentials and payment data
The once popular Outlook add-in AgreeTo was turned into a powerful phishing kit after the developer abandoned the project. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/02/outlook-add-in-goes-rogue-and-steals-4000-credentials-and-payment-data/
-
1Password open sources a benchmark to stop AI agents from leaking credentials
Research has shown that some AI models can identify phishing websites with near-perfect accuracy when asked. When those same models are used as autonomous agents with access … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/02/12/1password-security-comprehension-awareness-measure-scam-ai-benchmark/
-
Phishing campaign chains old Office flaw with fileless XWorm RAT to evade detection
Fileless .NET stage and a modular XWorm core: Beyond initial access, Fortinet observed a fileless .NET stage loaded directly into memory, followed by process hollowing into msbuild.exe, a legitimate Microsoft build tool capable of executing .NET code. The choice of msbuild.exe aligns with the malware’s runtime requirements while helping it blend into normal system activity.”A…
-
Phishing campaign chains old Office flaw with fileless XWorm RAT to evade detection
Fileless .NET stage and a modular XWorm core: Beyond initial access, Fortinet observed a fileless .NET stage loaded directly into memory, followed by process hollowing into msbuild.exe, a legitimate Microsoft build tool capable of executing .NET code. The choice of msbuild.exe aligns with the malware’s runtime requirements while helping it blend into normal system activity.”A…
-
Phishing, Fake Webshops & Co.: Cyber-Bedrohungen am Valentinstag
Am Valentinstag sollte es um die Liebe gehen, nicht darum, von Cyberkriminellen missbraucht oder hereingelegt zu werden. Angesichts raffinierter gefälschter Shops, ähnlicher Dating-Websites und einer Flut von nicht klassifizierten Valentinstag-Domains sollten Verbraucher wachsam bleiben. First seen on infopoint-security.de Jump to article: www.infopoint-security.de/phishing-fake-webshops-co-cyber-bedrohungen-am-valentinstag/a43693/
-
Phishing, Fake Webshops & Co.: Cyber-Bedrohungen am Valentinstag
Am Valentinstag sollte es um die Liebe gehen, nicht darum, von Cyberkriminellen missbraucht oder hereingelegt zu werden. Angesichts raffinierter gefälschter Shops, ähnlicher Dating-Websites und einer Flut von nicht klassifizierten Valentinstag-Domains sollten Verbraucher wachsam bleiben. First seen on infopoint-security.de Jump to article: www.infopoint-security.de/phishing-fake-webshops-co-cyber-bedrohungen-am-valentinstag/a43693/
-
Phishing campaign chains old Office flaw with fileless XWorm RAT to evade detection
Fileless .NET stage and a modular XWorm core: Beyond initial access, Fortinet observed a fileless .NET stage loaded directly into memory, followed by process hollowing into msbuild.exe, a legitimate Microsoft build tool capable of executing .NET code. The choice of msbuild.exe aligns with the malware’s runtime requirements while helping it blend into normal system activity.”A…
-
Cyberbedrohungen am Valentinstag
Tags: phishingDer Valentinstag ist wie jedes Jahr nicht nur ein kommerzielles Ereignis für Online-Shopping, digitales Dating und Last-Minute-Geschenken, er ist ebenso ein wichtiger Tag für Cyberkriminelle. Sicherheitsforscher von Check Point haben einen starken Anstieg von Phishing-Websites, betrügerischen Shops und gefälschten Dating-Plattformen zum Thema Valentinstag festgestellt. Diese zielen darauf ab, persönliche Daten und Zahlungsinformationen zu stehlen. …
-
Microsoft Store Outlook add-in hijacked to steal 4,000 Microsoft accounts
The AgreeTo add-in for Outlook has been hijacked and turned into a phishing kit that stole more than 4,000 Microsoft account credentials. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/microsoft-store-outlook-add-in-hijacked-to-steal-4-000-microsoft-accounts/
-
How to Prevent Vishing Attacks Targeting Okta and other IDPs
<div cla Vishing as the Front Door to MFA Bypass Threat reporting tied to ShinyHunters and Scattered Spider-linked activity shows voice phishing (vishing) being operationalized as a coordinated access vector against enterprise identity systems. Rather than relying solely on email-based phishing, attackers now call employees directly, impersonating IT support, security teams, or identity administrators. These…
-
How to Prevent Vishing Attacks Targeting Okta and other IDPs
<div cla Vishing as the Front Door to MFA Bypass Threat reporting tied to ShinyHunters and Scattered Spider-linked activity shows voice phishing (vishing) being operationalized as a coordinated access vector against enterprise identity systems. Rather than relying solely on email-based phishing, attackers now call employees directly, impersonating IT support, security teams, or identity administrators. These…
-
Phorpiex Phishing Delivers Low-Noise Global Group Ransomware
High-volume phishing campaign delivers Phorpiex malware via malicious Windows Shortcut files First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/phorpiex-phishing-global-group/
-
Germany warns of state-linked phishing campaign targeting journalists, government officials
Tags: access, advisory, communications, cybersecurity, germany, government, intelligence, office, phishingIn a joint advisory issued late last week, Germany’s domestic intelligence agency (BfV) and federal cybersecurity office (BSI) said attackers are attempting to gain access to private messaging accounts in order to monitor confidential communications and potentially compromise broader networks. First seen on therecord.media Jump to article: therecord.media/germany-warns-phishing-campaign-signal-gov-officials-journalists
-
Windows shortcut weaponized in Phorpiex-linked ransomware campaign
Phorpiex as the distribution layer: Forcepoint attributed the email distribution in this campaign to the Phorpiex botnet, also known as Trik. Phorpiex has been operating for more than a decade and is known for maintaining a large global footprint capable of delivering spam at scale. In this campaign, infected systems within the botnet are used…
-
Windows shortcut weaponized in Phorpiex-linked ransomware campaign
Phorpiex as the distribution layer: Forcepoint attributed the email distribution in this campaign to the Phorpiex botnet, also known as Trik. Phorpiex has been operating for more than a decade and is known for maintaining a large global footprint capable of delivering spam at scale. In this campaign, infected systems within the botnet are used…
-
Pride Month Phishing Targets Employees via Trusted Email Services
Attackers are using Pride Month themed phishing emails to target employees worldwide, abusing trusted email platforms like SendGrid to harvest credentials. First seen on hackread.com Jump to article: hackread.com/pride-month-phishing-employees-trusted-email-services/
-
SaferDay Zero-Trust-Prinzipien ermöglichen es, Daten souverän zu kontrollieren
Der Safer-Internet-Day erinnert uns daran, dass Sicherheit im Netz mit Bewusstsein beginnt. Was vor Jahren als Initiative zur Medienkompetenz startete, hat heute eine neue Dimension erreicht: In Zeiten geopolitischer Spannungen und zunehmender Cyberbedrohungen geht es längst nicht mehr nur um den Schutz vor Phishing oder Datenmissbrauch. Es geht um die digitale Souveränität Europas. Wir stehen…

