By

iZOOlogic
sim swap attack smshing cryptocurrency
A man aged 20 from Dublin, was arrested and brought before the High Court on Thursday on foot of an extradition warrant. During a brief appearance, he indicated he understood the charges. He was remanded in custody until May 22. The US Attorney General for the Eastern State of Michigan said that their investigation had...
Continue Reading
data breach hacking fraud prevention
One seriously threatening part about data breaches and getting hacked is the period from when the breach was done, and the actual time it takes for the end user or the company to find out that they’ve been attacked. You begin to think that from that certain phase, those cyber criminals may have already acquired...
Continue Reading
remote administration tool rat phishing campaign malware
Remote Administration Tool (RAT) Summary Babylon RAT as it used phishing campaign to deliver pervasively, an open-source platform that allows for various breaches. The encrypted traffic and the ability to create SOCKS proxies can help negate network security measures. The client builder allows for Anti-Virus bypassing which helps the binary get to the endpoint safely....
Continue Reading
atlassian server hacked inject trojans injection hacker malware
A group of attackers are actively exploiting a critical vulnerability in Atlassian’s Confluence collaboration software to inject trojans and infect servers with the GandCrab ransomware. Confluence is a Java-based web application that provides a shared wiki-type workspace for enterprise employees and is used by tens of thousands of companies worldwide.   The vulnerability, tracked as...
Continue Reading
attack on banks smshing malware simjacking injection
It has been said before that financial institution is losing an astounding amount yearly from cyberattacks. Monetizing attack on banks and financial institutions are no longer concentrated by cybercriminals; instead they shifted attention to employees from large business organizations. Workers occupying positions under financial departments, accountants and bank are realized that they can steal money...
Continue Reading
EternalBlue MimiKatz Cryptobot malware
We detected a cryptobot malware that uses multiple propagation and infection methods to drop a Monero cryptocurrency miner onto as many systems and servers as possible. Initially observed in China in early 2019, the methods it previously used to infect networks involved accessing weak passwords and using pass-the-hash technique, Windows admin tools, and brute force...
Continue Reading
chinese hacking group hack malware
The US Justice Department charged a Chinese hacking group with carrying out one of the largest criminal hacks in United States health care history that resulted in 79 million people having their personal information stolen. In the four-count indictment cited by the Justice Department, officials allege Wang Fujie, 32, and another man referred to only...
Continue Reading
tivit databreach phishingattacks
Just last month, various databases and cloud storage servers belonging to Tivit, a Brasilian based IT solutions and network storage provider, were hacked/compromised by unnamed assailants. In a series of leaks across Twitter over a 5 day time period, between December 7th-12th 2018, the login user names and credentials to more than a dozen Tivit...
Continue Reading
electricfish trojan malware
Executive Summary Two days ago (9th May), a Joint effort between Department of Homeland Security (DHS) and Federal Bureau of Investigation (FBI) published a Malware Analysis Report (MAR) about a Trojan malware variant known as ELECTRICFISH. A North Korean based malicious actor known as HIDDEN COBRA is known to have utilized this malware. The targets...
Continue Reading
fast phishing attacks
Phishing threat timeline It will only take a fraction of a second to complete the entire phishing phase, from the time the first victim opens and clicks on malicious email, attachment or url – then reaction time shutting down phishing website or tracing email reference to moving on after a few hours as if nothing...
Continue Reading
1 2 3 47