Quantcast
Channel: Threat actors – HACKHUNTING
Browsing all 20 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Cyber Warfare: Hackers have been using CVE-2017-8570 via PPSX to Attack Ukraine

The Ukraine war has been in existence for at least two years now. There were several war weapons being used in the war between Russia and Ukraine which involved cyberattacks, phishing attacks and...

View Article


Image may be NSFW.
Clik here to view.

Docker Hub Hosted a Massive 3 Million Imageless Repositories for Phishing...

Docker Hub is a platform for hosting docker images that can be used to insert into applications. Additionally, the platform also offers developers with options to develop, collaborate and distribute...

View Article

Image may be NSFW.
Clik here to view.

Dropbox sign Data Breach: API Keys, OAuth Tokens and Passwords Reset

The Dropbox owned Dropbox sign has been identified with a data breach in which a threat actor gained unauthorized access to the production environment of Dropbox sign and accessed sensitive data....

View Article

Image may be NSFW.
Clik here to view.

TargetCompany Ransomware Group Installs Mallox Ransomware on Vulnerable...

The TargetCompany ransomware group was first discovered in June 2021 that had been using several malware variants such as Tor2Mine,CoinMiner and BlueSky ransomware. Currently, the threat group...

View Article

Image may be NSFW.
Clik here to view.

Hackers Distribute RokRAT LNK Files Pretending as a Certificate

A new campaign of distributing RokRAT malware has been discovered in which threat actors are using different LNK files with legitimate names. The targets of interest were highly South Korean users and...

View Article


Image may be NSFW.
Clik here to view.

So, this was the Mastermind Behind the Million Dollars LockBit 3.0

Ever since LockBit’s emergence in 2019, law enforcements and several organizations have been struggling to fight against their ransomware attacks. LockBit acts as a ransomware-as-a-service platform...

View Article

Image may be NSFW.
Clik here to view.

Dell, HSBC and Barclays Data Breach: Millions of Users Data Exposed!

There have been major data breaches in Dell, HSBC and Barclays that could have exposed millions of customer data as well as company data to threat actors. These data have been posted on underground...

View Article

Image may be NSFW.
Clik here to view.

Google’s New Android Theft Protection Features: Protect Your Device Before,...

Smartphones have become a third hand for almost everyone that lets us perform several important tasks including online banking, capturing pictures, scheduling meetings, sending emails, storing...

View Article


Image may be NSFW.
Clik here to view.

Hackers use Malicious OneNote files for Delivering Payloads to Victims

Microsoft OneNote is another application that comes with the Microsoft Office Suite which is used as a digital note-taking application. OneNote can store multiple types of information such as Image,...

View Article


Image may be NSFW.
Clik here to view.

Gomir Backdoor:  Kimsuky’s Springtail Attack campaign uses new Linux Backdoor

Kimsuky threat actors have been known to be attributed to Democratic People’s Republic of Korea (DPRK) military intelligence. There have been several large-scale social engineering attacks from North...

View Article

Image may be NSFW.
Clik here to view.

Hackers use New execution technique via ClearFake campaign to install LummaC2

ClearFake is a new JavaScript Framework which typically offers threat actors drive-by downloads on compromised websites. Threat actors can use this framework along with social engineering techniques...

View Article

Image may be NSFW.
Clik here to view.

Rafel RAT : The Android Malware capable of Ransomware Operations

Android malware has been on the rise ever since the boom of digital technologies and social media. There were several types of Android malware observed in the past such as viruses, Trojans,...

View Article

Image may be NSFW.
Clik here to view.

“Killer Ultra” Malware: AV/EDR Evasion, Ransomware Operation and Arbitrary...

Qilin ransomware was well known for attacking Synnovis, a London-based provider of pathology services causing a healthcare crisis at London hospitals. The threat group took responsibility for their...

View Article


Image may be NSFW.
Clik here to view.

Hackers Use India Post Lures targets iPhone users in India for Phishing Attack

There have been several phishing campaigns in the past impersonating government entities to gain trust from victims. India Post is India’s government-operated postal system which has a large network...

View Article

Image may be NSFW.
Clik here to view.

Hackers Leverage TryCloudflare Tunnels to Deliver RAT Malware

TryCloudflare is a tool introduced by Cloudflare which allows developers to experiment with Cloudflare Tunnel without adding a site to Cloudflare’s DNS. In other words, a site running on localhost can...

View Article


Image may be NSFW.
Clik here to view.

Fileless Ransomware named “Cronus” targets Users with Fake PayPal Documents

Ransomware attacks have been on the rise since the beginning of 2024 with various ransomware variants used by different threat actors. However, Fileless ransomware is not very common.  Given the name...

View Article

Image may be NSFW.
Clik here to view.

77th Independence Anniversary Greeted with Multiple Defaced websites by Hackers

With India celebrating their 77th Independence day today, there were many hacktivists groups that have attacked several organizations in India. The cyberattacks against the organizations were...

View Article


Image may be NSFW.
Clik here to view.

Ransom Extortion Campaign attacks 110,000 Domains with Leaked Environment...

Hackers have been found to be targeting cloud environments due to their heavy usage by organizations and the sensitive information that is stored. A recent campaign has been discovered in which the...

View Article

Image may be NSFW.
Clik here to view.

Software Supply Chain Threat Landscape July 2024: PyPI, NPM, GitHub and macOS

Software Supply Chain is an easy and a massive target for threat actors due to the use of open-source software packages in several organizations. In July 2024, there were several supply chain attacks...

View Article

Image may be NSFW.
Clik here to view.

Pavel Durov’s Arrest: What is Happening on/to Telegram? Why was Telegram...

On August 26, 2024, Telegram’s Founder and CEO Pavel Durov was arrested in France. The arrest was made three after he arrived in France. The reason for the arrest was specified as “running a platform...

View Article
Browsing all 20 articles
Browse latest View live