Tag
#backdoor
By Waqas According to the breach notification, 369 Elbit Systems employees got their information stolen by the attackers. This is a post from HackRead.com Read the original post: US branch of Israeli defense contractor Elbit hit by data breach
Cybercriminals are continuing to prey on users searching for cracked software by directing them to fraudulent websites hosting weaponized installers that deploy malware called NullMixer on compromised systems. "When a user extracts and executes NullMixer, it drops a number of malware files to the compromised machine," cybersecurity firm Kaspersky said in a Monday report. "It drops a wide variety
Backdoor.Win32.Augudor.b malware suffers from a code execution vulnerability.
Backdoor.Win32.Psychward.b malware suffers from a hardcoded credential vulnerability.
Backdoor.Win32.Bingle.b malware suffers from a hardcoded credential vulnerability.
A China-aligned advanced persistent threat actor known as TA413 weaponized recently disclosed flaws in Sophos Firewall and Microsoft Office to deploy a never-before-seen backdoor called LOWZERO as part of an espionage campaign aimed at Tibetan entities. Targets primarily consisted of organizations associated with the Tibetan community, including enterprises associated with the Tibetan
By Deeba Ahmed According to Microsoft 365 Defender Research Team, in an incident they analyzed, malicious OAuth applications were deployed on compromised cloud tenants, and eventually, attackers took over Exchange servers to carry out spam campaigns. This is a post from HackRead.com Read the original post: New Spam Attack Abusing OAuth Apps to Target Microsoft Exchange Servers
Cybercriminals took control of enterprise Exchange Servers to spread large amounts of spam aimed at signing people up for bogus subscriptions.
Researchers from SentinelLabs laid out what they know about the attackers and implored the researcher community for help in learning more about the shadowy group.
The tactic is just one in a constantly expanding bag of tricks that attackers are using to get users to click on links and open malicious documents.