Moroccan Cybercrime Group Atlas Lion Hiding in Plain Sight During Attacks on Retailers

The Atlas Lion group used stolen credentials to enroll its own virtual machines (VMs) into an organization’s cloud domain, according to researchers at cybersecurity firm Expel.

GOFFEE’s recent attacks: new tools and techniques

GOFFEE continued to launch targeted attacks against organizations in Russia, utilizing PowerTaskel, a non-public Mythic agent written in PowerShell, and introducing a new implant that researchers dubbed “PowerModul”.

EncryptHub's Dual Life Between Cybercrime and Windows Bug Bounty Research Uncovered

A new report by Outpost24 researchers linked the EncryptHub threat actor with SkorikARI, the account that reported CVE-2025-24061 and CVE-2025-24071, after they allegedly infected themselves and exposed their credentials.

Hunters International Dumps Ransomware, Goes Full-on Extortion

The decision appears to come in the wake of international law enforcement operations over the past two years with names like Endgame, Morpheus, Cronos, and Magnus that disrupted the operations of cybercriminal groups.

Russian Hackers Exploit MSC EvilTwin Flaw to Deploy SilentPrism and DarkWisp Backdoors

The attack chains involve the use of provisioning packages (.ppkg), signed Microsoft Windows Installer files (.msi), and .msc files to deliver information stealers and backdoors that are capable of persistence and data theft.

APT36 Spoofs India Post Website to Infect Windows and Android Users with Malware

A Pakistan-linked APT group has been found creating a fake website masquerading as India's public sector postal system as part of a campaign designed to infect both Windows and Android users in the country.

RedCurl Threat Group Create QWCrypt Ransomware to Target Hyper-V Virtual Machines

While most ransomware operations focus on VMware ESXi servers, RedCurl's new QWCrypt ransomware specifically targets virtual machines hosted on Hyper-V. Bitdefender observed attacks involving phishing emails with ".IMG" attachments disguised as CVs.

Inside Kimsuky's Latest Tactics, Malicious Scripts, and Payloads

K7 Labs reported that the North Korean group Kimsuky used obfuscated scripts and multi-stage payloads in a recent cyber campaign to steal browser data, log keystrokes, and evade detection through VMware checks and encoded malware components.

EncryptHub Linked to MMC Zero-Day Attacks on Windows Systems

Attackers can leverage the vulnerability to evade Windows file reputation protections and execute code because the user is not warned before loading unexpected MSC files on unpatched devices.

Chinese Weaver Ant Hackers Spied on Telco Network for Four Years

A China-linked advanced threat group named Weaver Ant spent more than four years in the network of a telecommunications services provider, hiding traffic and infrastructure with the help of compromised Zyxel CPE routers.

Defend Against Threats with Cyber Fusion

Cyware is the leading provider of cyber fusion solutions that power threat intelligence sharing , end-to-end automation and 360-degree threat response.

Trending Tags