Tag: tactics
-
SHROUDED#SLEEP: APT37’s Advanced Evasion and Persistence Tactics in Southeast Asia
In a recent discovery, the Securonix Threat Research team, led by Den Iuzvyk and Tim Peck, has uncovered a stealthy malware campaign attributed to Nor… First seen on securityonline.info Jump to article: securityonline.info/shroudedsleep-apt37s-advanced-evasion-and-persistence-tactics-in-southeast-asia/
-
Cyberattackers Use HR Targets to Lay More_Eggs Backdoor
The FIN6 group is the likely culprit behind a spear-phishing campaign that demonstrates a shift in tactics, from targeting job seekers to going after … First seen on darkreading.com Jump to article: www.darkreading.com/cyberattacks-data-breaches/attackers-targeting-recruiters-more_eggs-backdoor
-
Storm-0501 Targets Hybrid Clouds with Evolving Ransomware Tactics
In a recent report from Microsoft Threat Intelligence, the cybercriminal group Storm-0501 has been identified as a rising threat, targeting hybrid clo… First seen on securityonline.info Jump to article: securityonline.info/storm-0501-targets-hybrid-clouds-with-evolving-ransomware-tactics/
-
Discover Latest Ransomware Tactics and Zero Trust Strategies in This Expert Webinar
Ransomware is no longer just a threat; it’s an entire industry. Cybercriminals are growing more sophisticated, and their tactics are evolving rapidly…. First seen on thehackernews.com Jump to article: thehackernews.com/2024/09/discover-latest-ransomware-tactics-and.html
-
Hacktivist Groups Operating Together! Connection Ober TTPs Uncovered
Cybersecurity experts have uncovered a significant connection between hacktivist groups BlackJack and Twelve through overlapping tactics, techniques, … First seen on gbhackers.com Jump to article: gbhackers.com/hacktivist-groups-operating-together/
-
Threat Actors Exploit HR-Related Phishing Tactics in Sophisticated Credential-Stealing Campaigns
Phishing attacks continue to evolve in complexity, and the latest report from the Cofense Phishing Defense Center highlights a troubling trend: cyberc… First seen on securityonline.info Jump to article: securityonline.info/threat-actors-exploit-hr-related-phishing-tactics-in-sophisticated-credential-stealing-campaigns/
-
Patchwork APT Group Unleashes Nexe Backdoor: A New Era in Cyber Espionage Tactics
Recent analyses by Cyble Research and Intelligence Labs (CRIL) have brought to light an ongoing cyber campaign orchestrated by the notorious Patchwork… First seen on thecyberexpress.com Jump to article: thecyberexpress.com/patchwork-apt-group/
-
Embargo ransomware escalates attacks to cloud environments
Microsoft warns that ransomware threat actor Storm-0501 has recently switched tactics and now targets hybrid cloud environments, expanding its strateg… First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/embargo-ransomware-escalates-attacks-to-cloud-environments/
-
New Qilin tactics a ‘bonus multiplier’ for ransomware chaos
Sophos X-Ops caught the Qilin ransomware gang stealing credentials stored by victims’ employees in Google Chrome, heralding further cyber attacks and … First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366608129/New-Qilin-tactics-a-bonus-multiplier-for-ransomware-chaos
-
WalletConnect Scam: A Case Study in Crypto Drainer Tactics
ey takeaways Introduction Crypto drainers are malicious tools that steal digital assets like NFTs, and tokens from cryptocurrency wallets. They often … First seen on research.checkpoint.com Jump to article: research.checkpoint.com/2024/walletconnect-scam-a-case-study-in-crypto-drainer-tactics/
-
Stargazers Ghost Network
esearch by: Antonis Terefos (@Tera0017) Key Points Introduction Threat actors continually evolve their tactics to stay ahead of detection. Traditional… First seen on research.checkpoint.com Jump to article: research.checkpoint.com/2024/stargazers-ghost-network/
-
MFA bypass becomes a critical security issue as ransomware tactics advance
Ransomware is seen as the biggest cybersecurity threat across every industry, with 75% of organizations affected by ransomware more than once in the p… First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2024/09/24/ransomware-session-hijacking-tactics/
-
ENISA Warns About Hacktivist, Ransomware Crossover
Hacktivists Are Likely to Increasingly Adopt Cybercrime Tactics, Report Says. Ransomware hacks and self-declared hacktivist denial-of-services attacks… First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/enisa-warns-about-hacktivist-ransomware-crossover-a-26333
-
RansomHub Adopts New Tactics in Latest Attack, Bypasses EDR and Harvests Credentials
Recently, the ThreatDown Managed Detection and Response (MDR) team has uncovered a novel attack method employed by the RansomHub ransomware group. The… First seen on securityonline.info Jump to article: securityonline.info/ransomhub-adopts-new-tactics-in-latest-attack-bypasses-edr-and-harvests-credentials/
-
Crimson Palace Returns: Chinese State-Sponsored Cyber Espionage Operation Escalates with New Tools and Targets
After a brief hiatus, the Crimson Palace operation, a Chinese state-directed cyber espionage campaign, has resurfaced, armed with new tactics and an e… First seen on securityonline.info Jump to article: securityonline.info/crimson-palace-returns-chinese-state-sponsored-cyber-espionage-operation-escalates-with-new-tools-and-targets/
-
How Law Enforcement’s Ransomware Strategies Are Evolving
The threat of ransomware hasn’t gone away. But law enforcement has struck a blow by adjusting its tactics and taking out some of the biggest adversari… First seen on darkreading.com Jump to article: www.darkreading.com/cybersecurity-operations/how-law-enforcement-ransomware-strategies-are-evolving
-
Threat Actors Continue to Utilize HR-Related Phishing Tactics
First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/09/threat-actors-continue-to-utilize-hr-related-phishing-tactics/
-
Crimson Palace Returns With New Hacking Tolls And Tactics
Cluster Bravo, despite its brief initial activity, subsequently targeted 11 organizations in the same region, as researchers found that these attacker… First seen on gbhackers.com Jump to article: gbhackers.com/crimson-palace-hacking-tools-tactics/
-
Fake Recruiter Coding Tests Target Developers with Malicious Python Packages in Ongoing North Korean Cyber Campaign
A new report from ReversingLabs has uncovered a sophisticated cyber campaign targeting developers, using fake recruiter tactics to deliver malicious P… First seen on securityonline.info Jump to article: securityonline.info/fake-recruiter-coding-tests-target-developers-with-malicious-python-packages-in-ongoing-north-korean-cyber-campaign/
-
Earth Preta’s Cyber Arsenal Expands: New Malware and Strategies Target APAC Governments
A new report from Trend Micro has revealed that Earth Preta, the notorious cyber espionage group, has significantly evolved its tactics and malware ar… First seen on securityonline.info Jump to article: securityonline.info/earth-pretas-cyber-arsenal-expands-new-malware-and-strategies-target-apac-governments/
-
Cybersecurity Talent Shortage Prompts White House Action
The Biden administration launches an initiative to encourage careers in cybersecurity, as businesses try new tactics to get unfilled IT security roles… First seen on darkreading.com Jump to article: www.darkreading.com/cybersecurity-operations/cybersecurity-talent-shortage-prompts-white-house-action
-
Quad7 botnet evolves to more stealthy tactics to evade detection
The Quad7 botnet evolves and targets new SOHO devices, including Axentra media servers, Ruckus wireless routers and Zyxel VPN appliances. The Sekoia … First seen on securityaffairs.com Jump to article: securityaffairs.com/168250/malware/quad7-botnet-evolves.html
-
Evasion Tactics Used By Cybercriminals To Fly Under The Radar
Relentless in their methods, attackers will continue employing evasion tactics to circumvent traditional security measures. The post Evasion Tactics U… First seen on securityweek.com Jump to article: www.securityweek.com/evasion-tactics-used-by-cybercriminals-to-fly-under-the-radar/
-
Emulating the Persistent and Stealthy Ebury Linux Malware
AttackIQ has released a new attack graph that seeks to emulate the Tactics, Techniques and Procedures (TTPs) associated with Ebury Linux malware. Desp… First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/09/emulating-the-persistent-and-stealthy-ebury-linux-malware/
-
Predator Spyware Roars Back: New Infrastructure, Evasive Tactics
Recently, cybersecurity researchers from Insikt Group have identified a resurgence of Predator spyware infrastructure, previously believed to be large… First seen on securityonline.info Jump to article: securityonline.info/predator-spyware-roars-back-new-infrastructure-evasive-tactics/
-
Phishing Via Typosquatting and Brand Impersonation: Trends and Tactics
Introduction Following the 2024 ThreatLabz Phishing Report, Zscaler ThreatLabz has been closely tracking domains associated with typosquatting and bra… First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/09/phishing-via-typosquatting-and-brand-impersonation-trends-and-tactics/
-
Black Basta’s Evolving Tactics and the Rising Role of LLMs in Cyber Attack
On the latest episode of the Microsoft Threat Intelligence podcast, host Sherrod DeGrippo and her expert guests delved into the cutting-edge technique… First seen on securityonline.info Jump to article: securityonline.info/black-bastas-evolving-tactics-and-the-rising-role-of-llms-in-cyber-attack/

