26 Jan 2022

Threat Actors Blanket Androids with Flubot, Teabot Campaigns

Attackers have been using a technique called smishing and injecting a malicious Google Play QR reader to infect victims’ phones with malicious banking trojans. Researchers have detailed a variety of active campaigns delivering the Flubot and Teabot trojans via various different methods. In one case, malicious SMS messages containing a

Read More
26 Jan 2022

Cyber-Attack on Global Affairs Canada

Cybercriminals have reportedly targeted Global Affairs Canada, a federal government entity responsible for handling the country’s diplomatic and global relations. The cyberattackers hit the entity on Wednesday, just one day before the Canadian Centre for Cyber Security issues a warning urging infrastructure operators to be wary of Russian based cyber

Read More
26 Jan 2022

Pro-democracy org hijacked to become macOS spyware distributor

Researchers have reportedly uncovered a new strain of macOS malware that is being distributed in attacks against visitors to a Hong Kong pro-democracy radio station website. The website was used to facilitate a watering hole-style attack and serve a Safari browser to exploit to visitors. Therefore, the malware was deployed

Read More
25 Jan 2022

Belarus Activists Fire Ransomware at State Railway

A group of Belarusian cyberattackers are claiming to have successfully launched a ransomware attack on Belarus’s state-run train company. The actions were allegedly performed in a bid to disrupt Russian troop movements. The group revealed the attack on Twitter, claiming to have encrypted some of the railway’s servers, databases, and

Read More
25 Jan 2022

Microsoft warns about this phishing attack that wants to read your emails

Microsoft has warned that Office 365 customers are receiving phishing emails that aim to trick unsuspecting users into giving OAuth permissions to an app that allows attackers to read and write emails. The OAuth phishing emails were delivered to hundreds of Office 365 customers, warned the Microsoft Security Intelligence team.

Read More
25 Jan 2022

Trellix finds OneDrive malware campaign targeting gov’t officials in Western Asia

Hackers are leveraging Microsoft OneDrive in a multi-stage espionage campaign that aims to target high-ranking government officials in Western Asia. Researchers at Trellix released a report detailing the campaign. The cybercriminals are using a malware named “Graphite” by researchers because it uses Microsoft’s Graph API to leverage OneDrive as a

Read More
24 Jan 2022

McAfee Bug Can Be Exploited to Gain Windows SYSTEM Privileges

McAfee has recently patched two different high-severity bugs in its Agent component that could be used by attackers to escalate privileges, including up to SYSTEM. The bugs could also allow attackers to achieve arbitrary code execution and perform other malicious actions. The bug lies in the McAfee Enterprise product for

Read More
24 Jan 2022

20K WordPress Sites Exposed by Insecure Plugin REST-API

More than 20,000 WordPress sites are vulnerable to malicious code injection, phishing scams, and other cyber threats due to a high-severity cross-site scripting (XSS) bug affecting the WordPress Email Template Designer. The template designer is WP HTML Mail, a plugin that allowed users to design custom emails. Wordfence researcher Chloe

Read More
20 Jan 2022

Ransomware Attack on Moncler

Italian luxury brand Moncler has suffered a cyberattack in which cybercriminals stole data and published it on the dark web. The company confirmed the attack on Tuesday, stating that it had suffered from a data breach after being attacked by the AlphV/BlackCat ransomware operation in December. The attack caused a

Read More
20 Jan 2022

Cheap malware is behind a rise in attacks on cryptocurrency wallets

Chainalysis has recently warned that a rise in cheap and easy to use malware has resulted in a rise of cryptocurrency theft. Crytocurrency has been a popular target for cybercriminals, whether they are stealing it via cryptocurrency exchanges or demanding it as an extortion payment in ransomware attacks. The growing

Read More