Phishing Page 1

Iranian Hackers Spearphishing Cyberattacks Israel Impersonation Social Engineering

Iranian hackers used spearphishing attacks to target Israel

An alleged group of Iranian hackers has been operating a spearphishing campaign that includes masquerading known government officials. Based on reports, the Iran-sponsored threat group posed as a former United States ambassador to target think tank officials. The malicious threat actors could obtain initial access to one of its two targeted email boxes through phishing...
Continue Reading
Phishing Toolkit NakedPages Traded Dark Web Hacking Forums Cybercrime

A new phishing toolkit dubbed NakedPages is traded on the dark web

Phishing actors were seen selling a new sophisticated toolkit called NakedPages on underground marketplaces, allegedly effective against large-scale companies. Aside from being found on the dark web forums, the NakedPages toolkit is also promoted by its operators on some malicious Telegram channels. Originally designed for the Linux OS, the new phishing toolkit requests reading, writing,...
Continue Reading
Sandworm Hackers Follina Critical Flaw Ukraine Windows OS Computer

Sandworm hackers used the Follina critical flaw to target Ukraine

The Russian threat group Sandworm may be taking advantage of a recently disclosed Follina to target Ukraine. Follina is a remote code execution vulnerability in Microsoft Windows Support Diagnostic Tool, which researchers currently track as CVE-2022-30190. The security flaw can be activated by opening or selecting a maliciously modified document. Therefore, different threat groups have...
Continue Reading
SVCReady Newest Addition Malicious Malware Family MS Word Phishing Email

SVCReady is the newest addition to the malicious malware family

Researchers have monitored spam attacks spread by a new malware variant called SVCReady. The campaign has been operating since April, utilising an unorthodox malware delivery method via MS Word. According to the researchers, the operators behind it deployed numerous updates in May and noticed that the malware appears to be in the development stage and...
Continue Reading
Facebook Phishing Campaigns Attack Vector

Facebook phishing campaigns have become a widespread attack vector

A wide-scale phishing campaign was found exploiting Facebook and Facebook Messenger social media applications to victimise account users and trick them into giving away their account credentials. Once the hackers have gained access to the users’ Facebook accounts, they will use it to defraud more victims, allowing them to generate money on commissions through online...
Continue Reading
Fake Android VPN Mobile Apps SideWinder APT Threat Group Pakistan Malware Spear Phishing

Fake Android VPN apps used by the SideWinder APT to target Pakistan

The SideWinder APT group has included a new custom tool for malware strains in phishing attacks distributed to Pakistani organisations. The phishing links are attached to emails impersonating legitimate notifications and services of government departments and organisations in Pakistan. SideWinder, an advanced persistent threat group that has been active since 2012, primarily focuses on attacking...
Continue Reading
China Chinese Hacker Twisted Panda Russian Firms

A new China-based Twisted Panda campaign fired against Russian firms

The Chinese state-backed APT campaign dubbed Twisted Panda has recently been attributed to the cyberattacks against two Russian research institutes and a Belarusian firm. Analysts state that the new attack operations came amid the ongoing conflict between Russia and Ukraine to leverage the situation and launch attacks. Furthermore, studies about the campaign revealed that its...
Continue Reading
Fileless Malware Phishing Campaign AveMariaRAT PandoraHVNC BitRAT Password Stealer

Three fileless malware spread through a new phishing campaign

Researchers have uncovered a new phishing campaign targeting Windows users using three different fileless malware that can steal critical information from the targeted systems. The three fileless malware are identified as the AveMariaRAT, PandoraHVNC, and BitRAT. The threat operators target several victims to steal usernames and passwords, screen records and exfiltrate other critical information, such...
Continue Reading
Phishing Threat Actors HTML Files Cyberattack Campaigns Email

Phishing actors continued leveraging HTML files in their campaigns

New studies revealed that HTML files are still at the top of most utilised attachments used by threat actors in performing phishing attacks. Records from the first quarter of 2022 showed how attaching these files has effectively bypassed anti-spam solutions and tricked victims into opening malicious files. HyperText Markup Language or HTML is a standard...
Continue Reading
Jester Stealer Phishing Campaign CERT-UA Cyber Threat

Jester Stealer spread via phishing campaigns, CERT-UA warns

Threat actors had been observed spreading another emerging malware dubbed Jester Stealer through phishing emails, as warned by Ukraine’s CERT-UA (Computer Emergency Response Team). In the phishing emails, the victims are threatened with looming ‘chemical attacks,’ thus forcing recipients to open the malicious files attached. The Russia-Ukraine war had been going on for a few...
Continue Reading
1 2 3 28