Search Results

hacking
DoNot Hacking Group Indian Hackers Spyware Trojan Malware Google Play Malicious Apps

DoNot hacking group spreads spyware apps on Google Play

The DoNot hacking group has allegedly used three Android applications to harvest information from targeted devices. Based on reports, the malicious applications contain spyware that could collect data, such as contact lists and location data. Researchers explained that the operation is from the earlier mentioned Indian hacking group notorious for targeting high-profile organisations in Southeast...
Continue Reading
Terminator Hacking Tool Underground Forums Dark Web Hackers

Terminator hacking tool gets offered on underground forums

A threat entity has provided the Terminator hacking tool on a Russian hacking forum. Based on reports, a threat actor named Spyboy offered the device, which could allegedly disable various AV, EDR, and XDR security products. However, a security firm countered the claims since they believe the Terminator hacking tool is just a sophisticated BYOVD...
Continue Reading
Sandworm Hacking Group APT WinRAR Wipe Ukrainian Data

Sandworm hacking group uses WinRAR to wipe Ukrainian data

The Russia-based hacking group, Sandworm, has allegedly attacked Ukrainian state networks using WinRAR to wipe data on government devices. According to CERT-UA, the Russian cybercriminal group utilised a compromised VPN account that did not employ multi-factor authentication (MFA) to access critical systems in Ukrainian state networks. After the attackers acquired access to the targeted network,...
Continue Reading
AuKill Hacking Tool Vulnerability Exploit Ransomware Windows OS

AuKill hacking tool exploits process explorer to launch ransomware

Threat groups have been recently using the AuKill hacking tool to obfuscate their attacks. This emerging tool could enable an attacker to terminate EDR software, which is common among organisations. Researchers confirmed that AuKill had aided at least three ransomware campaigns in the past months. Based on reports, a couple of Medusa Locker ransomware campaigns...
Continue Reading
Hackers Headlight Hacking Strategy Dark Web Smart Cars Toyota RAV4 Carnapping Vulnerability Digital Risk

Hackers use headlight hacking strategy to steal vehicles

Criminals use a new cybersecurity attack called headlight hacking to acquire access to a targeted vehicle’s interconnected systems through its headlight. Researchers claimed that the attackers utilised a simple device that resembles a Bluetooth speaker, promoted on the dark web, as an emergency starter device for compatible smart cars. The emergency-started device allows users to...
Continue Reading
Joker DPR Hacking Group Russia Geopolitical Conflict Ukraine

Joker DPR played a massive role as a hacking group for Russia

The pro-Russian hacker group, Joker DPR, has become a critical Russian attack force member during the ongoing geopolitical conflict in Ukraine. The group is notorious for numerous cybercriminal campaigns that target crucial information from the Ukrainian military and government websites. The group also aided the Russian government in disseminating its propaganda on countless social media...
Continue Reading

CEO Telegram Account Hacking – World’s Largest Airline

Case Study CEO Telegram Account Hacking – World’s Largest Airline This case study details the deployment of the Executive Protection solution in protecting the Telegram account of the world’s largest airline’s CEO from a hack. Request a copy of this Case Study First Name* Last Name* Business Email* Company Name* Subject* Δ Client Support Global...
Continue Reading
Acer Taiwan Stolen Dataset Data Leak Hacking Forum Dark Web Tech Cybersecurity

Acer admits owning the sold stolen data on a hacking forum

Acer, one of Taiwan’s most successful companies, confirmed that it experienced a data breach incident after threat actors infiltrated one of their servers that hosts essential documents used by their repair team. The company’s preliminary investigation of its systems showed that the cybercriminal operation did not impact customer data. However, the company confirmed the incident...
Continue Reading
Bangladeshi Hackers Hacking Group Cyberthreat India Banking DDOS Vulnerability

A Bangladesh-based hacking group posed threats to Indian firms

Numerous distributed denial-of-service (DDoS) attacks have been detected against different banking institutions in India, according to a recent discovery by our threat researchers in iZOOlogic. The series of attacks on Indian firms and news publishers began last February, accomplished by the ‘Team Mysterious Bangladesh’ group. The initial attacks happened on February 10, when the Team...
Continue Reading
Asia Clasiopa Hacking Group Indian Hackers Backdoors Malware Data Exfiltration

Asian orgs targeted by the new Clasiopa hacking group

Threat researchers have discovered a previously unknown hacking group called Clasiopa, targeting materials research organisations across Asia. The findings on this new hacking group have yet to uncover its origins. However, during the in-depth analysis of the new hacking group, the researchers noticed some references pointing out that Clasiopa might be Indian-based. These clues include...
Continue Reading
1 2 3 4 63