DUCKTAIL Malware Employs LinkedIn Messages to Execute Attacks

LinkedIn messages were used as a way to launch identity theft attacks in a malicious campaign that Cluster25 detected.  They send messages from hacked accounts with PDF files that look like job offers. But these files have links to dangerous websites that can steal your data. Cluster25 is a cybersecurity firm that specializes in threat […]

The post DUCKTAIL Malware Employs LinkedIn Messages to Execute Attacks appeared first on GBHackers on Security | #1 Globally Trusted Cyber Security News Platform.

Seiko confirmed a data breach after BlackCat attack

Japanese watchmaker Seiko revealed that the attack that suffered earlier this year was carried out by the Black Cat ransomware gang. On August 10, 2023, the Japanese maker of watches Seiko disclosed a data breach following a cyber attack. “Seiko Group Corporation (hereinafter referred to as “the Company” or “we”) has confirmed that on July […]

The post Seiko confirmed a data breach after BlackCat attack appeared first on Security Affairs.

New Undetected Python-Based Info-stealer Offered Via Dedicated Website

Akira is an information stealer malware that was found in March 2023. This malware can steal sensitive information, including saved credentials and payment card details, usernames, system ID, hardware details, installed software, and network configurations.  Once this information is extracted, it uploads the data on a ‘GoFile’ online storage management service and Discord instant messaging […]

The post New Undetected Python-Based Info-stealer Offered Via Dedicated Website appeared first on GBHackers on Security | #1 Globally Trusted Cyber Security News Platform.

Vietnam-Based Cyber Groups Using Fake Job Postings to Deliver Malware

Several cybercriminal groups based in Vietnam are using fake job postings to trick users into installing malware, according to researchers at WithSecure. The researchers are tracking several related malware campaigns, including “DarkGate” and …

Bracing for AI-enabled ransomware and cyber extortion attacks

AI has been the shiniest thing in tech since at least November 2022, when ChatGPT was made available to the masses and unveiled the transformative potential of large language models for all the world to see. As businesses scramble to take the lead in o…

The outstanding stealth of Operation Triangulation

In this report Kaspersky shares insights into the validation components used in Operation Triangulation, TriangleDB implant post-compromise activity, as well as details of some additional modules.

Vietnamese threat actors linked to DarkGate malware campaign

Researchers linked Vietnamese threat actors to the string of DarkGate malware attacks on entities in the U.K., the U.S., and India. WithSecure researchers linked the recent attacks using the DarkGate malware to a Vietnamese cybercrime group previously known for the usage of Ducktail stealer. DarkGate is a commodity malware that is offered with a model […]

The post Vietnamese threat actors linked to DarkGate malware campaign appeared first on Security Affairs.