Double chats scheme unveiled REvil Ransomware gang cheat partners dark web

Double chats scheme unveiled by REvil Ransomware gang to cheat on partners

REvil, a private ransomware-as-a-service (RaaS) group from Russia, has reportedly come back to its operations intending to cheat on its affiliates. According to reports made by security researchers, the ransomware gang cheats on its partners so they will be able to rob all ransom payments from their victims.  The operators of the REvil RaaS were reported...
Continue Reading
Daily operations disrupted ransomware attack Crystal Valley Cooperative

Daily operations disrupted as ransomware hits Crystal Valley Cooperative

Crystal Valley, a farm supply and grain marketing organization from Minnesota, has been hit by a ransomware attack, as confirmed from their Facebook post last September 19. The website went down temporarily as a result of the attack. As of now, it is working  The firm said from their statement that their computer systems have been attacked, disrupting its...
Continue Reading
Pandora Papers Data Leak offshore bank account data the world’s most powerful

Recent revelations about Pandora Papers: Leak exposing offshore bank account data of the world’s most powerful

The Pandora Papers involve a series of investigations regarding the recent leak of the illegal dealings of corrupted, wealthy, and influential individuals and their offshore bank accounts to conceal their unprecedented collection of money amounting to more than trillions of dollars.  Partnering with 600 journalists from over 100 media firms worldwide, the International Consortium of Investigative Journalists (ICIJ) holds the investigation. The group has already acquired about 11.9 million worth of confidential documents from different financial and...
Continue Reading
300k Subdomains exploited Phishing-as-a-Service Scam phishing attack

300,000 Subdomains gets exploited by a newly discovered Phishing-as-a-Service Scam

Microsoft reported a newly found Phishing-as-a-Service operation last Tuesday, which has used a high-volume 300,000 distinct and newly created subdomains that are operated in a single run. According to the tech giant, they discovered the campaign amid their research about phishing attacks triggered by the phishing-as-a-service operation named BulletProofLink. The procedure is reported to be offering low-cost domain hosting, email...
Continue Reading
5 Million files Colombia Real Estate customers exposed data breach compromised data aws

5.5 Million files of Colombian Real Estate customers got exposed in Data Breach

Researchers have found a data breach consisting of about 5.5 million exposed files, totalling over 1TB of data. The leaked information has affected more than 100,000 Colombian real estate customers.  According to the statements reported by the researchers, the leaked information was not encrypted. Therefore it does not require any password or login credentials to be able for anyone to...
Continue Reading
Spam campaign attacks new techniques South American organizations

Spam campaign attacks revise its techniques against South American organizations

Researchers have found that a spam campaign has revised its methods to add an extensive commodity remote access trojans or RATs and geolocation filtering to evade being detected by authorities. The said spam campaign focuses on distributing spear-phishing emails towards South American organizations.  According to security researchers, the attacks were attributed to an advanced persistent threat or APT...
Continue Reading
Indonesia government agencies ministries cyberattack threat actors cyber espionage mustang panda

Indonesian agencies and ministries attacked through threat actors cyber-espionage attempts

Cyber-espionage threat actors from China were reported to have breached about 10 internal networks of Indonesian agencies and government ministries. The attack includes the computer devices of Badan Intelijen Negara (BIN) – the primary intelligence services of Indonesia.  Unexpectedly, the cyber-espionage attempt of threat actors from China was revealed in between a time when both Indonesia...
Continue Reading
Cyber fifth warfare dimension UK armed forces

Cyber named as the fifth warfare dimension as per the UK armed forces

According to military leaders of the UK, their armed forces are preparing to commence significant advantages regarding their cybersecurity capabilities in the following years. Cyberspace being confirmed as the fifth warfare domain together with land, air, sea, and space forces the defence authorities to improve their operations all across the West.  The range of the reevaluation...
Continue Reading
massive rise cybercrime attacks India reached 11% 2020

Data says that a massive rise of cybercrime attacks in India reached up to 11.8% in 2020

Official data has shown that for the year 2020, India has recorded over 50,053 cases of cybercrime, and 11.8% of it has been a surge of offences over the prior fiscal year.  Following the country’s measuring system incidents per lakh population, the cybercrime rate in India has also grown from 3.3% last 2019 to up to 3.7%...
Continue Reading
Chinese APT campaign Operation Harvest McAffee

A Chinese APT campaign called ‘Operation Harvest’ was caught by McAffee

McAfee Enterprise, an American global computer security software company in California, has reported finding a threat actor group wherein they could dwell and collect data on a victim’s network for many years without being caught. The firm has identified the Chinese advanced persistent threat or APT campaign as “Operation Harvest”, where attackers use a mixture of both recognized and new...
Continue Reading
USDOT website impersonation email phishing online scam

USDOT has been impersonated to conduct a two-day email phishing scam

Within two days of the phishing campaign, the US Department of Transportation or USDOT has been imitated by cyber-attackers. They operated on combined tactics such as forming new domains to copy and mimic federal sites to appear authentic and avoid being detected by authorities.  Security researchers have identified at least 41 phishing emails between August 16 to 18....
Continue Reading
Fujitsu confirms cyberattack not related hacker marketplace Marketo dark web

Fujitsu officially confirms that the cyberattack on its systems are not related to hacker marketplace Marketo

A 4GB worth of stolen data allegedly from Fujitsu was posted last August by a popular cybercrime marketplace known as Marketo. When the group was marketing the stolen data that they claim to be from Fujitsu, the company said that they were actually investigating a potential attack. They added that the source of this possible attack is unknown. Meanwhile, the attacker group Marketo said that they have...
Continue Reading
Evidence suspicious emails phishing attack threats vishing SMiShing

Evidence proves that one out of three flagged suspicious emails were actual phishing attack threats

Recent reports reveal that about a third of emails that employees have been reporting to be malicious are indeed threats of phishing attacks. From the analysis of IT security companies, it was found that at least 33% of more than 200,000 flagged emails by employees from different firms worldwide for the first half of 2021 are...
Continue Reading
Cryptocurrency great escape plan hackers dark web

Cryptocurrency is a great escape plan for hackers

Cybercrimes have been under the spotlight for the longest time, primarily because of how lucrative the business is for threat actors. Recent reports reveal that the cybercrime landscape has cost the world more than $1 trillion, and by 2025, it has been predicted to cost the world’s economy over $10 trillion. It makes this fact clear coming from the headlines...
Continue Reading
Azure flaw vulnerability hackers unauthorized access data cloud computing

Azure vulnerability threatens customers, which may have allowed hackers unauthorized access to data

Security researchers have identified a flaw towards Azure cloud, which threatens its customers about unauthorized hacker access through their data. This warning came from Microsoft themselves. The tech company said from their security team’s blog post that the flaw reported by Palo Alto Networks has already been fixed and worked on. They also added no evidence of abuse in...
Continue Reading
Puma 1GB source code data stolen hackers dark web

More than 1GB of Puma source code data stolen by hackers; customer information not affected

Puma, a German multinational firm that manufactures athletic apparel, has recently been attacked by hackers who have stolen their data. The hackers threaten the company to distribute their private information through the dark web if they do not pay the ransom demand.  Researchers have also learned that Puma’s stolen information, specifically their source code for internal application, had already...
Continue Reading
Pro-Chinese government campaigns fake accounts misinformation propaganda social media

Pro-Chinese government campaigns use fake accounts to disseminate misinformation propaganda

Researchers are tracking campaigns that are pointed towards the promotion of the Chinese government and encouragement of real-world protests regarding America’s issues with the COVID-19 pandemic.   Last Wednesday, the researchers said that when the pro-People’s Republic of China or PRC network was discovered around June of 2019, it comprised fake account webs on social media sites such as Facebook, YouTube,...
Continue Reading
Microsoft Office Documents exploited Zero Day Attack Vulnerability Windows Users

Microsoft Office Documents being exploited for a Zero-Day Attack against Windows Users

Active exploitation of zero-day attacks was reported by Microsoft last Tuesday as it impacts Internet Explorer. The browser is used in hijacking Windows systems vulnerability by taking advantage of manipulated Microsoft Office documents.  A zero-day attack refers to a problem wherein the victim has only learned about the flaw so that they have “zero days” left to fix it. It...
Continue Reading
Digital COVID-19 vaccination proof faked Bug Flaw Security Researchers

Digital COVID-19 vaccination proof can be faked, Flaw discovered by Security Researchers

A digital COVID-19 vaccine certificate can be faked, as warned by Richard Nelson, an Australian software engineer. This Australian digital contact-tracing program has serious flaws, according to the researcher, who is part of an independent cybersecurity group. This tactic can be done through Express Medicare, a government-operated application. He has sent a bug report to the in-charge developers...
Continue Reading
Malware Payload cracked software Traffic Exchange Networks

Bundles of Malware Payload disguised as cracked software through Traffic Exchange Networks

A campaign to leverage a network of websites has been actively operating against websites that act as “droppers as a service” in distributing bundles of malware payload toward its targets, searching for cracked versions of consumer and business applications.  According to cybersecurity researchers, the said malware comprises assorted click fraud bots and other information stealers. It...
Continue Reading
1 2 3 4 5 34