Tag: theft
-
Bridewell report indicates rise in lone wolf ransomware actors
Tags: attack, cybersecurity, data, encryption, extortion, ransomware, service, strategy, theft, threatBridewell, a UK-based cybersecurity services company, has released its latest CTI Annual Report a comprehensive deep dive into ransomware trends. It highlighted a significant shift in attack strategies, payment dynamics and threat actor behaviours, revealing that data theft and extortion have overtaken traditional encryption-only ransomware as the most successful approach for attackers. While encryption-based The…
-
Hacker ‘IntelBroker’ charged in US for global data theft breaches
A British national known online as “IntelBroker” has been charged by the U.S. for stealing and selling sensitive data from dozens of victims, causing an estimated $25 million in damages. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/british-hacker-intelbroker-charged-with-25m-in-cybercrime-damages/
-
Hackers Using Malicious SonicWall VPN for Credential Theft
Trojanized NetExtender Installer Exfiltrates Data to Hardcoded IP Address. Fake versions of SonicWall VPN software contain a credential-stealing Trojan, the California network security company warned Monday. Imposter versions of tools such as VPNs, virtual desktops and software development tools are often laced with infostealers. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/hackers-using-malicious-sonicwall-vpn-for-credential-theft-a-28815
-
Glasgow City Council impacted by ‘cyber incident’
The Glasgow City Council announced that it was affected by an incident “disrupting a number of online services and which may have involved the theft of customer data.” First seen on therecord.media Jump to article: therecord.media/glasgow-city-council-cyber-incident
-
Trezor’s support platform abused in crypto theft phishing attacks
Trezor is alerting users about a phishing campaign that abuses its automated support system to send deceptive emails from its official platform. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/trezors-support-platform-abused-in-crypto-theft-phishing-attacks/
-
The Security Fallout of Cyberattacks on Government Agencies
Cyberattacks against government agencies are escalating at an alarming pace. From state departments to small municipal offices, public sector organizations have become prime targets for ransomware, credential theft, and increasingly sophisticated supply chain attacks. What once were isolated breaches have evolved into systemic risks threatening public safety, economic stability, and national security. Behind this surge……
-
China-linked LapDogs Campaign Drops ShortLeash Backdoor with Fake Certs
ShortLeash backdoor, used in the China-linked LapDogs campaign since 2023, enables stealth access, persistence, and data theft via compromised SOHO routers and fake certs. First seen on hackread.com Jump to article: hackread.com/china-lapdogs-drops-shortleash-backdoor-fake-certs/
-
Turning evasion into detection: Varonis Jitter-Trap redefines beacon defense
Turning evasion into detection: Beacons represent one of the most difficult-to-detect stages in an attack, enabling stealthy command-and-control (C2) communication long after the initial compromise, thereby threatening data theft, lateral movement, or ransomware deployment.As attackers tweak C2 profiles, shuffle payloads, or obfuscate binaries for evasion against the static detection methods, Jitter-Trap attempts a defense reinvention…
-
Steel Giant Nucor Suffers Cyberattack, IT Systems Breached
Nucor Corporation, the largest steel producer and recycler in North America, has confirmed it suffered a significant cybersecurity breach that disrupted operations across multiple facilities and led to the theft of limited company data. The incident, first disclosed in a regulatory filing in mid-May, marks one of the most impactful cyberattacks on the U.S. manufacturing…
-
North Korean BlueNoroff Uses Deepfakes in Zoom Scams to Install macOS Malware for Crypto Theft
The post North Korean BlueNoroff Uses Deepfakes in Zoom Scams to Install macOS Malware for Crypto Theft appeared first on Daily CyberSecurity. First seen on securityonline.info Jump to article: securityonline.info/north-korean-bluenoroff-uses-deepfakes-in-zoom-scams-to-install-macos-malware-for-crypto-theft/
-
BitoPro exchange links Lazarus hackers to $11 million crypto heist
The Taiwanese cryptocurrency exchange BitoPro claims the North Korean hacking group Lazarus is behind a cyberattack that led to the theft of $11,000,000 worth of cryptocurrency on May 8, 2025. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/bitopro-exchange-links-lazarus-hackers-to-11-million-crypto-heist/
-
New Android Malware Surge Hits Devices via Overlays, Virtualization Fraud, and NFC Theft
Cybersecurity researchers have exposed the inner workings of an Android malware called AntiDot that has compromised over 3,775 devices as part of 273 unique campaigns.”Operated by the financially motivated threat actor LARVA-398, AntiDot is actively sold as a Malware-as-a-Service (MaaS) on underground forums and has been linked to a wide range of mobile campaigns,” PRODAFT…
-
New Android Malware Surge Hits Devices via Overlays, Virtualization Fraud and NFC Theft
Cybersecurity researchers have exposed the inner workings of an Android malware called AntiDot that has compromised over 3,775 devices as part of 273 unique campaigns.”Operated by the financially motivated threat actor LARVA-398, AntiDot is actively sold as a Malware-as-a-Service (MaaS) on underground forums and has been linked to a wide range of mobile campaigns,” PRODAFT…
-
Special Webinar: Key Insights from Verizon’s 2025 DBIR
GenAI, credential theft, third-party risks”, Verizon’s 2025 DBIR reveals what’s putting your org at risk. Join DBIR author Alex Pinto & LayerX CEO Or Eshed as they break down this year’s key insights and defense strategies. Don’t miss the webinar”, register now. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/special-webinar-key-insights-from-verizons-2025-dbir/
-
Cloud IP theft risk rises amid collaboration surge
First seen on scworld.com Jump to article: www.scworld.com/brief/cloud-ip-theft-risk-rises-amid-collaboration-surge
-
Hackers Exploit Critical Langflow Flaw to Unleash Flodrix Botnet
A vulnerability in the popular Python-based tool for building AI agents and workflows is under active exploitation, allowing for full system compromise, DDoS attacks, and potential loss or theft of sensitive data First seen on darkreading.com Jump to article: www.darkreading.com/vulnerabilities-threats/hackers-exploit-langflow-flaw-flodrix-botnet
-
Katz Stealer Boosts Credential Theft with System Fingerprinting and Persistence Mechanisms
The emergence of Katz Stealer, a sophisticated information-stealing malware-as-a-service (MaaS) that is redefining the boundaries of credential theft. First detected this year, Katz Stealer combines aggressive data exfiltration with advanced system fingerprinting, stealthy persistence mechanisms, and evasive loader tactics. Distributed primarily through phishing emails and fake software downloads, this malware targets a vast array of…
-
‘Grafana Ghost’ XSS flaw exposes 47,000 servers to account takeover
From open-redirect to plugin-powered takeover: Based on the PoC shared by OX Security, the exploit leverages a clever combo of client-side path traversal and open-redirect mechanics in Grafana’s staticHandler, the component responsible for serving static files like HTML, CSS, JavaScript, and images from the server to the user’s browser.A potential attack can have a crafted…
-
KIA Ecuador Keyless Entry Systems Vulnerability Faces Major Theft Threat
A critical security flaw has been uncovered in the keyless entry systems (KES) widely used in KIA vehicles across Ecuador, exposing thousands of cars to a heightened risk of theft. The vulnerability, identified by independent hardware security researcher Danilo Erazo, centers on the use of outdated “learning code” technology in aftermarket key fobs homologated and…
-
2 Software Firms Report Major Health Data Theft Hacks
Ocuco and Episource Breaches Affect Health Sector Clients, Patients. An Ireland-based provider of eye care practice software and a California-based medical coding services firm have reported separate hacking incidents to U.S. and state regulators that have likely affected dozens of their clients and hundreds of thousands of people. First seen on govinfosecurity.com Jump to article:…
-
Microsoft 365 Copilot: New Zero-Click AI Vulnerability Allows Corporate Data Theft
Researchers have found a flaw in Microsoft 365 Copilot that allows the exfiltration of sensitive corporate data with a simple email First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/microsoft-365-copilot-zeroclick-ai/
-
Singapore leads multinational operation to shutter scam centers tied to $225 million in thefts
Nearly 2,000 people were arrested and millions of dollars in illicit funds were seized in an operation coordinated by Singapore police against Asian scam operations. First seen on therecord.media Jump to article: therecord.media/asia-scam-center-takedowns-singapore-police
-
Singapore leads multinational operation to shutter scam centers tied to $225 million in thefts
Nearly 2,000 people were arrested and millions of dollars in illicit funds were seized in an operation coordinated by Singapore police against Asian scam operations. First seen on therecord.media Jump to article: therecord.media/asia-scam-center-takedowns-singapore-police
-
Dumping Entra Connect Sync Credentials
Recently, Microsoft changed the way the Entra Connect Connect Sync agent authenticates to Entra ID. These changes affect attacker tradecraft, as we can no longer export the sync account credentials; however, attackers can still take advantage of an Entra Connect sync account compromise and gain new opportunities that arise from the changes. How It Used To Work…
-
Stolen Ticketmaster data from Snowflake attacks briefly for sale again
The Arkana Security extortion gang briefly listed over the weekend what appeared to be newly stolen Ticketmaster data but is instead the data stolen during the 2024 Snowflake data theft attacks. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/stolen-ticketmaster-data-from-snowflake-attacks-briefly-for-sale-again/
-
Report: Child ID theft surges 40% in three years
Tags: theftFirst seen on scworld.com Jump to article: www.scworld.com/brief/report-child-id-theft-surges-40-in-three-years

