Recorded Future

Malicious Infrastructure Finds Stability with aurologic GmbH

aurologic GmbH, a German hosting provider, has emerged as a central enabler of malicious infrastructure by providing upstream connectivity to numerous high-risk and sanctioned networks.

Rhadamanthys Stealer Adds Innovative AI Feature in Version 0.7.0

Rhadamanthys, an advanced information stealer, has introduced innovative AI capabilities in version 0.7.0, allowing it to extract cryptocurrency seed phrases from images using optical character recognition (OCR).

GreenCharlie Infrastructure Targeting US Political Entities with Advanced Phishing and Malware

GreenCharlie attackers use dynamic DNS providers to register domains for phishing attacks, with deceptive themes like cloud services and document visualization to trick victims into revealing sensitive information or downloading malware payloads.

OilAlpha Malicious Applications Target Humanitarian Aid Groups Operating in Yemen

The attacks, linked to a group called OilAlpha, involved malicious mobile apps and targeted CARE International, Norwegian Refugee Council (NRC), and Saudi Arabian King Salman Humanitarian Aid and Relief Centre.

APT28 Targets Key Networks in Europe with Multi-Phase Espionage Campaign

Using the HeadLace malware and credential-harvesting web pages, APT28 operates with great stealth and sophistication, relying on legitimate internet services and off-the-land binaries to conceal their activities.

Exploring the Depths of SolarMarker's Multi-tiered Infrastructure

The core of SolarMarker’s operations is its layered infrastructure, which consists of at least two clusters: a primary one for active operations and a secondary one likely used for testing new strategies or targeting specific regions or industries.

GitCaught Campaign Leverages GitHub Repositories and Fake Profiles for Malicious Infrastructure

Insikt Group uncovered a sophisticated campaign led by Russian-speaking actors who used GitHub profiles to spoof legitimate software apps and distribute various malware, including Atomic macOS Stealer (AMOS) and Vidar.

Cybercriminal Campaign Spreads Infostealers, Highlighting Risks to Web3 Gaming

The campaign targets Web3 gamers, exploiting their potential lack of cyber hygiene in the pursuit of profits. It represents a significant cross-platform threat, utilizing a variety of malware to compromise users' systems.

RedAlpha Conducts Multi-Year Credential Theft Campaign Targeting Critical Entities Globally

Chinese state-sponsored threat activity group RedAlpha has been registering and weaponizing hundreds of domains spoofing global organizations to target government organizations and think tanks globally.

China-Linked Group TAG-28 Targets India’s “The Times Group” and Government Agency UIDAI With Winnti Malware

Researchers reported suspected intrusions targeting the Indian media conglomerate The Times Group; the Unique Identification Authority of India (UIDAI); and the Madhya Pradesh Police department.

Defend Against Threats with Cyber Fusion

Cyware is the leading provider of cyber fusion solutions that power threat intelligence sharing , end-to-end automation and 360-degree threat response.

Trending Tags