Cisco

Chinese Threat Actor UAT-5918 Targets Critical Infrastructure Entities in Taiwan

Typical tooling used by UAT-5918 includes networking tools such as FRPC, FScan, In-Swor, Earthworm, and Neo-reGeorg. Credential harvesting is accomplished by dumping registry hives, NTDS, and using tools such as Mimikatz and browser data stealers.

Attackers Leverage Cascading Style Sheets for Evasion and Tracking

Cybersecurity experts have uncovered how hackers use CSS to deceive spam filters and monitor user behavior. This sophisticated technique allows malicious actors to remain under the radar while gaining insights into user preferences and actions.

Miniaudio and Adobe Acrobat Reader Vulnerabilities Discovered

CVE-2024-41147 is an out-of-bounds write vulnerability in Miniaudio. CVE-2025-27163 and CVE-2025-27164 are out-of-bounds read vulnerabilities in the font functionality in Adobe Acrobat, which can lead to information disclosure.

Lotus Blossom Espionage Group Targets Multiple Industries With Different Versions of Sagerunex and Hacking Tools

Cisco Talos uncovered two new variants of the Sagerunex backdoor, which were detected during attacks on telecommunications and media companies, as well as many Sagerunex variants persistent in the government and manufacturing industries.

New TorNet Backdoor Seen in Widespread Campaign Targeting Europe

Cisco Talos discovered an ongoing malicious campaign operated by a financially motivated threat actor since as early as July 2024 targeting users, predominantly in Poland and Germany, based on the phishing email language.

Threat Actors Use Copyright Infringement Phishing Lure Against Taiwanese Users to Deploy Info-stealers

Cisco Talos has identified a phishing campaign targeting Facebook business users in Taiwan, using emails disguised as legal notices to trick recipients into downloading malware.

Threat Actor Abuses Gophish to Deliver New PowerRAT and DCRAT

The campaign involves modular infection chains requiring the victim's interaction, with the malware being delivered through Maldoc or HTML-based methods. The phishing emails use the Russian language, fake Yandex Disk links, and spoofed VK pages.

UAT-5647 Targets Ukrainian and Polish Entities with RomCom Malware Variants

UAT-5647 has advanced its tooling to include downloaders RustClaw and MeltingClaw, a Rust backdoor DustyHammock, and a C++ backdoor ShadyHammock. The threat actor attempted to compromise edge devices to evade detection during lateral movement.

Threat Actor Believed to be Spreading New Medusalocker Variant Since 2022

BabyLockerKZ has expanded its reach to different continents, shifting from Europe to South America in early 2023. It has distinct features compared to MedusaLocker, such as unique storage keys and differences between Windows and Linux versions.
September 13, 2024

Chinese-speaking Hackers Linked to DragonRank SEO Manipulator Service

By exploiting web app services, the attackers deploy a web shell to launch malware and gather credentials, compromising IIS servers to spread the BadIIS malware. The malware facilitates proxy ware and SEO fraud by manipulating search engine rankings.

Defend Against Threats with Cyber Fusion

Cyware is the leading provider of cyber fusion solutions that power threat intelligence sharing , end-to-end automation and 360-degree threat response.

Trending Tags