Proof Point

Around the World in 90 Days: State-Sponsored Actors Try ClickFix

Multiple state-sponsored hacking groups from Iran, North Korea, and Russia have been found leveraging the increasingly popular ClickFix social engineering tactic to deploy malware over three months from late 2024 through the beginning of 2025.

HTTP Client Tools Exploitation for Account Takeover Attacks

Most HTTP-based cloud attacks utilize brute force methods, resulting in low success rates. Proofpoint found that a recent campaign using the unique HTTP client Axios had an especially high success rate, compromising 43% of targeted user accounts.

TA397’s New Attack Chain Delivers WmRAT and MiyaRAT Malware for Espionage

The attack chain used alternate data streams in a RAR archive to deliver a shortcut (LNK) file that created a scheduled task on the target machine to pull down further payloads.

Security Brief: ClickFix Social Engineering Technique Floods Threat Landscape

Proofpoint researchers have identified an increase in ClickFix. The ClickFix social engineering technique uses dialogue boxes containing fake error messages to trick people into copying, pasting, and running malicious content on their own computer.

Royal Mail-Themed Lures Deliver Open Source Prince Ransomware

Hackers posed as the UK's Royal Mail to spread Prince ransomware in a destructive campaign that targeted organizations in the US and UK in mid-September. Unlike typical ransomware attacks, this campaign had no decryption methods.

Suspected Espionage Campaign Delivers New Voldemort Malware

The campaign, which targeted organizations worldwide, involved impersonating tax authorities from various countries and utilizing Google Sheets for command and control (C2).

TA453 Targets Religious Figure with Fake Podcast Invite Delivering New BlackSmith Malware Toolset

Iran-linked TA453 targeted a religious figure with a fake podcast interview invitation, attempting to deliver the BlackSmith malware toolkit. The initial lure involved an email leading to a malicious link containing the AnvilEcho PowerShell trojan.

Threat Actor Abuses Trial Feature for Cloudflare Tunnels to Deliver RATs

Hackers are exploiting the free TryCloudflare service to distribute remote access trojans (RATs) like AsyncRAT, GuLoader, and Remcos RAT. This activity was first detected in February and has been linked to campaigns targeting various industries.

Security Brief: Scammers Create Fraudulent Olympics Ticketing Websites

Proofpoint has discovered a fraudulent website, paris24tickets[.]com, claiming to sell tickets for the Paris 2024 Summer Olympic Games. The site appeared as the second sponsored search result on Google, but Proofpoint confirmed its fraudulent nature.

Piano Scam Campaigns Tricks Students with Advance Fee Fraud

In the scam campaigns, the threat actor purports to offer up a free piano, often due to alleged circumstances like a death in the family. When a target replies, the actor instructs them to contact a shipping company to arrange delivery.

Defend Against Threats with Cyber Fusion

Cyware is the leading provider of cyber fusion solutions that power threat intelligence sharing , end-to-end automation and 360-degree threat response.

Trending Tags