Category

Central Asia

Central Asia Page 2

GoldBackdoor Malware APT37 Threat Group North Korea South Korea Journalists Phishing

GoldBackdoor malware used by an APT group to target Journalists

A North Korean state-sponsored threat group called APT37 has been discovered targeting journalists specialising in the Korean republic using the GoldBackdoor malware. Reports stated that the threat actors distribute the malware through several phishing campaigns. A researcher discovered the attack and immediately contacted a malware expert for assistance and analysis last month. The malware expert...
Continue Reading
Cicada APT Cyberespionage Threat Group APT10 Stone Panda Backdoors

Cicada APT group widens its range of victims to conduct espionage attacks

An advanced persistent threat (APT) group known as Cicada or APT10 has widened its targets, which first started by attacking only Japanese enterprises, to now a wide range of new countries so that they could conduct more widespread espionage attacks. The Chinese-speaking Cicada APT group is also known for its other titles, such as Stone...
Continue Reading
Storm Cloud Hacking Group GIMMICK Custom Malware Asia MacOS

Storm Cloud used its custom malware to target Asian macOS users

A Chinese espionage threat group called Storm Cloud uses custom-made malware to target macOS users based in Asia. Researchers identified the malware used by the threat actors as GIMMICK, which is a previously unknown macOS malware strain. The GIMMICK malware was found during an analysis of a cyberespionage attack in the latter parts of last...
Continue Reading
Threat Actors Internet Unpatched Microsoft SQL Servers Vulnerability Flaw Exploit

Threat actors hunt the internet to target unpatched Microsoft SQL servers

Researchers discovered a malicious threat campaign targeting unpatched Microsoft SQL servers on the web. The threat actors distribute Cobalt Strike Beacons on their potential hosts that still use unpatched SQL servers, and eye incompetently managed public-facing Microsoft SQL servers to be utilised for further widespread infection across cyberspace. Moreover, the intrusions involve scanning port 1433...
Continue Reading
ALPHV BlackCat Ransomware Dark Web Cyber Landscape Hacker Group

BlackCat ransomware increases reputation within the cyber landscape

The ALPHV, better known as the BlackCat ransomware, was first identified by researchers in the early weeks of November last year and immediately proved to everyone that they are indeed sophisticated. The BlackCat is the first that used Rust-based malware since most ransomware gangs do not even contemplate using the same malware. As of now,...
Continue Reading
OiVaVoii Hybrid Cyberattack OAuth C-Level Officials Executives

OiVaVoii hybrid cyberattack exploits OAuth apps to target c-level officials

Recently, researchers stumbled upon a peculiar hybrid cyberattack campaign conducted by the threat group OiVaVoii that targeted several c-level executives and had abused several malicious OAuth apps. The threat group targets executives and general managers with custom phishing messages sent from hacked Microsoft Office 365 accounts and malicious OAuth apps. Even though Microsoft has blocked...
Continue Reading
Firms Asia Middle East Seedworm Group Iranian Hackers Spear Phishing Malware Social Engineering

Firms from Asia and the Middle East targeted by the Seedworm group

Researchers claimed to have seen the Iranian-backed cybercriminal group Seedworm targeting telecommunication companies, IT providers, and utility firms located in selected countries in Asia and the Middle East. According to their investigations, these threat actors have targeted these institutions for the past six months. The state-backed threat group is using a combination of malware, network...
Continue Reading
WordPress Fake Ransomware Attacks Fraud Prevention Hijack

WordPress sites owners targeted by fake ransomware attacks

A new series of ransomware attacks have hijacked about 300 WordPress sites to portray false encryption warnings, which is used to fool site owners into paying a ransom of 0.1 BTC for restoration and retrieval. The threat actors’ ransom demands include a countdown timer to create panic and a sense of urgency for the targeted...
Continue Reading
DNS Attacks Cyber threat domain name system DNSSEC Vulnerabilities

Survey reveals that DNS cyberattacks pose major threats to organisations

Cybersecurity leaders have conducted a study that shows the alarming hike of domain name system (DNS) attacks against organisations for 2021. The survey result revealed that within the past 12 months, 72% of participants had experienced a DNS cyberattack.   61% of victimised organisations have suffered from multiple attacks, while 11% are attacked regularly. In terms of cyberattack recovery, one-third of the respondents said...
Continue Reading
Data Leak Subscriber Data Thingiverse open forum incident breach notification

Digital Design Sharing Website Leaks Over 200,000 Subscriber Data

According to a researcher, a website dedicated to sharing an original created digital design called Thingiverse has leaked 36-gigabyte backup files containing 200,000 email addresses and other personal information. The data dump is currently being circulated on a known hacking forum.  The Thingiverse purpose is to give free, open-source hardware designs that can be licensed under the Creative Commons licenses or General Public...
Continue Reading
1 2 3 4 14