Category

Middle East
corona virus maps azorult malware antimalware fraud prevention threat advisory

Corona Virus Maps, a software stealing software

Corona virus has now spread rapidly worldwide and recently declared by the World Health Organization as a global pandemic. Amidst the Global fear this virus has brought us, cybercriminals do not show signs of slowing down as they are continuously capitalizing on the said virus to spread different kinds of cyber-attacks.   There is a newly...
Continue Reading
ta5050 phishing campaign malware antimalware financial organizations

A threat actor known as TA505 recently launched a phishing campaign that uses living-of-the-land binaries (LOLBins) to distribute a new backdoor malware

Threat Summary Malicious actor TA505 known for these notorious campaigns namely info stealer malware Dridex, the Locky ransomware, and more. Another attack carried out by the same group on multiple continents, including North America, Asia, Africa, and South America. Primarily focusing on large financial organizations, this group at the same time perform well-planned, advanced attacks...
Continue Reading

Data Wiping Malware hits Bahrain’s national oil company

On December 29, 2019, the National Cybersecurity Authority of Saudi Arabia published a new cyber-attack incident describing software that was deployed to target Bapco, the national oil company of Bahrain specifically. The malware, dubbed as “Dustman”, is a data-wiper, designed to access a computer, a database, or a server/mainframe, delete its data, and replace the...
Continue Reading

Sierra Leone Commercial Bank suffers a cyberattack – web defacement.

We recently reported on Iranian hackers attacks a US Government website, shortly after the killing of Qassem Suleimani in Baghdad, Iraq, in supposed retaliation. More information can be found here. The hacker, H4ck3D, behind this US government website attack also has claimed to deface the Sierra Leone Commercial Bank, one the main financial institutions in...
Continue Reading
joker stash dark web

Joker Stash – One of the Biggest Card Dumps

We routinely monitor the dark web for threats and suspicious activities. Joker Stash is a Dark Web store that sells compromised bank credit cards.   On the 28th (US Time) of October the Joker Stash dark web store announced its new release of cards for sale through their news bulletin.   Something more suspicious than...
Continue Reading
The Dark Web Exposed New Sale of Pakistani Banks Credit Card Dumps

The Dark Web Exposed New Sale of Pakistani Banks’ Credit Card Dumps

Security experts have just discovered another rather huge set of compromised payment cards details that was put on sale on Joker’s Stash, one of the most popular underground hubs of stolen card data, on Nov. 13. The new set of dumps, unauthorized digital copies of the information contained in magnetic stripe of a bank card,...
Continue Reading
Hackers Found Selling Pakistani Bank Data on the Dark Web

Hackers Found Selling Pakistani Bank Data on the Dark Web

Malicious threat actors have apparently figured out how to take assets from almost every bank in Pakistan, in a stunning unforeseen development. The gigantic money related break was affirmed by the executive of cybercrimes at Pakistan’s Federal Investigation Agency, wing Captain (retd) Mohammad Shoaib, various nearby news outlets detailed. The hackers have allegedly figured out...
Continue Reading
Navigation Hacking: A Rising Threat in Modern Technology

Navigation Hacking: A Rising Threat in Modern Technology

With today’s modern technology, long drives are a thing of the past. Traveling and navigating is as easy as typing the location into your mobile device and voila! You now have a clear path towards your destination. It’s all thanks to the good ol’ GPS (Global Positioning System). As long as you have your smartphone...
Continue Reading
UAE SIM-swap Scam

UAE SIM-swap Scam

Several banks in the UAE are now being tasked to warn their customers against a newly developing fraudulent scheme that exposes valuable banking information. These fraudsters can gain access to anyone’s text (SMS) notifications and OTPs (One Time Passwords) from their mobile devices. All they need to pull off this malicious SIM activity is a...
Continue Reading