Category

Financial Malware

Financial Malware page 1

Accellion data breach Clop ransomware malware File Transfer Appliance

The average ransomware payment increases due to the Accellion data breach

Clop ransomware group attacked Accellion, one of the companies that offer File Transfer Appliance. Typically, transferring files happens via email. However, emails have limitations, particularly when it comes to large attachments and sensitive data. Some companies are now using File Transfer Appliance (FTA) installed on a private cloud, on-premises, or hosted to securely manage and...
Continue Reading
IcedID malware contact forms financial trojan social engineering

Hackers abusing enterprise contact forms to deliver financial malware

Microsoft recently warned organizations of a new unique attack campaign that abuses contact forms found on websites to deliver financial malware to businesses through email that poses as email of legal threats. This new campaign is another trick of adversaries to abuse business infrastructures to evade and bypass installed security protection systems. The emails aim...
Continue Reading
php git server compromised supply chain attack

PHP’s git server gets compromised by another Supply Chain Attack

Another instance of a supply chain attack has been reported; this time, it’s on the Git repository of PHP and their data storage. The hacked repository and the codebase contents were tampered with. The incident’s investigation is ongoing and more details will be revealed in the upcoming days. On the initial reports, the malicious activity...
Continue Reading
data breach world's top 100 brands business reputation

World’s top 100 brands values at 223 billion dollars are at stake if a data breach occurs

A company’s sensitive information is stored on either local machine, cloud servers, and enterprise databases. A data breach can be defined as viewing an individual’s personal medical file without authorization or sharing a sensitive document without permission. When a company accidentally exposes data, it might be due to unintentional disclosure of data inside the job...
Continue Reading
cybercrime work from home remote work fraud prevention vulnerability exploit

Remote work leveraged for cybercrime by adversaries in targeted attacks

Cybercrime (CC) has never been projected as high as last fiscal year compared to the previous years. Historical data confirms the enormous leap of numbers on reported cases in various types of attack known by the cybersecurity experts. Incidents of repurposed tactics, newer and more lethal approach of adversaries were recorded complimenting the uprising cases...
Continue Reading
financial services finance industry sector covid19 cyberattacks fraud prevention

Financial Services suffer cyber-attacks related to Covid19

Cybercrime has significantly increased every year, which is directly proportional to the growth of technology. Factors attributed to this increase could be summed up due to the perpetrators’ persistent behaviour through new tactics like using Covid19 as theme and sophisticated applications. Cybercriminals are being backed up by governments and the victim’s open vulnerability. Different sectors...
Continue Reading
cryptojacking MrbMiner botnet Iran Vihansoft trojan Iran

MrbMiner botnet traced back to Iranian software company

With the growing followers of cryptocurrency, adversaries use different tactics to perform illegal mining activities to profit via cryptojacking. With the performance requirements needed by a database, riding to it is a great advantage that the ingenious MrbMiners has exploited. By targeting many Microsoft SQL servers via brute-force attacks, MrbMiner placed their group in the...
Continue Reading
iobit ransomware DeroHe vulnerability brand abuse

IOBit group forum hacked to spread ransomware to members

New player ransomware – DeroHe has recently added to their victim an established computer utility developer on their list. Their recent victim is the IOBit company that started in 2004, developing various applications that focus on computer optimization and virus/malware protection.  According to the report, the attack was orchestrated to the group forum of IOBit...
Continue Reading
github repository service malware abuse cybercrime threat actor attack vector

Cybercriminals abused GitHub repository services to host and distribute Malware

Github, an open-source software repositories platform, hosts many software development projects and files, making it the go-to website in terms of documentation and download channel for developers worldwide. These past few years, threat actors and cybercriminals abused and leveraged these accessible repositories to successfully distribute and host some Malware and malicious script components.   In...
Continue Reading
Cyberpunk 2077 crack installer mobile ransomware malware CoderWare BlackKingdom

Ransomware masquerades as the mobile version of Cyberpunk 2077

CoderWare is a recent ransomware in the block that has been victimizing the gamer populace under the guise of a trending game called Cyberpunk 2077 through the Windows and Android platform. Distributing them as game installers, cheats, and cracks are the social tricks used to get users installing the malware. Here is one screenshot where...
Continue Reading
1 2 3 31