Hackers Stolen Over $58 Million in Crypto Via Malicious Google and X Ads

Threat actors targeting crypto wallets for illicit transactions have been in practice for quite some time. Threat actors have been using Wallet Drainers for such cybercrime activities, which have seen great success in recent years.  Several techniques were used for draining, which include phishing ads, supply chain attacks, Airdrop phishing, DNS attacks, and many others. […]

The post Hackers Stolen Over $58 Million in Crypto Via Malicious Google and X Ads appeared first on GBHackers on Security | #1 Globally Trusted Cyber Security News Platform.

December 27, 2023
Read More >>

New Nim-Based Malware Delivered via Weaponized Word Document

Hackers use weaponized Word documents to deliver malicious payloads through social engineering.  By embedding malware or exploiting vulnerabilities in these documents, attackers trick users into opening them and leading to the execution of malicious code.  While leveraging the familiarity and trust associated with such file format, this tactic is effective for several illicit purposes:- Recently, […]

The post New Nim-Based Malware Delivered via Weaponized Word Document appeared first on GBHackers on Security | #1 Globally Trusted Cyber Security News Platform.

December 27, 2023
Read More >>