Brazilian Hacker Charged for Selling Data Stolen From Hacked Computers
Junior Barros De Oliveira, a 29-year-old resident of Curitiba, Brazil, has been indicted in the United States for orchestrating an extortion scheme involving data stolen from the computer systems of a Brazilian subsidiary of...
Notorious WrnRAT Delivered Mimic As Gambling Games
Hackers target gambling games primarily due to the lucrative financial opportunities they present. The online gambling industry is a rich territory for threat actors seeking to exploit vulnerabilities for "financial gain" and "data theft."
Cybersecurity...
Hackers Abusing Legitimate File Hosting Services For Sophisticated Phishing Attack
Stealing personal data information ('name', 'Social Security number', 'credit card details', etc.) for fraudulent activities is dubbed "identity theft."
While these types of cybercrimes are often termed as "financial identity theft," "medical identity theft," and...
RansomHub Exploiting RDP Services To Exfiltrate Large Volumes Of Data
Ransomware-as-a-Service (RaaS) significantly lowers the technical barriers for threat actors to launch ransomware attacks, even it also enables threat actors with minimal skills to execute sophisticated cyber attacks.
On a subscription basis, this model operates,...
AutoIT Malware Attacking Gmail Users To Steal Login Credentials
A malicious AutoIT-compiled executable has been discovered that attempts to open Gmail login pages using popular browsers and possesses capabilities to steal clipboard data, capture keystrokes, and manipulate system behavior.
It can also evade detection...
Beware! Styx Stealer Malware Stealing Browser & Instant Messenger Data
Recently cybersecurity researchers at Check Point discovered a new malware dubbed "Styx Stealer," capable of stealing browser and instant messenger data.
Threat actors often exploit stealers, enabling them to secretly gather sensitive information from the...
Beware Of Braodo Stealer That Steals Users’ Login Credentials
Stealers are one of the most used malicious tools that is used by threat actors. As such tools enable hackers to obtain sensitive information such as passwords, credit card details, and personal data from...
BianLian Ransomware Leveraging RDP Credentials To Gain Initial Access
BianLian emerged in 2022, and after its emergence rapidly, it became one of the three most active ransomware groups.
They started their operations by exploiting RDP, ProxyShell, and SonicWall VPN vulnerabilities.
The cybersecurity researchers at Juniper...
Beware Of “TRANSLATEXT” Chrome Extension From North Korean Hackers
Hackers abuse Chrome extensions since they can embed malware on many targets by using common extensions in the browser.
These unwanted extensions can gather personal data, display pop-ups, change URLs, and manipulate the browser after...
Fickle Stealer Attacking Windows Machine To Steal Sensitive Data
Hackers often abuse stealers to steal login credentials, financial data, and identity theft data hidden in the infected computer systems.
Stealer attacks are a low-risk and highly lucrative way for threat actors to make money...