Aggregator
Google Sues the Operators Behind the BadBox 2.0 Botnet
Google is suing the operators behind BadBox 2.0, accusing multiple Chinese threat groups of playing different roles in the operation of the massive botnet that rolled up more than 10 million devices to run large-scale ad fraud and other malicious campaigns.
The post Google Sues the Operators Behind the BadBox 2.0 Botnet appeared first on Security Boulevard.
New Surge of Crypto-Jacking Hits Over 3,500 Websites
Cybersecurity experts at cside have discovered a clever campaign that infected over 3,500 websites with nefarious JavaScript miners, marking a startling return to crypto-jacking techniques reminiscent of the Coinhive heyday of 2017. This new wave, detected in late 2024, marks a departure from the resource-intensive miners of the past, which caused noticeable device slowdowns and […]
The post New Surge of Crypto-Jacking Hits Over 3,500 Websites appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
China's Massistant Tool Secretly Extracts SMS, GPS Data, and Images From Confiscated Phones
Japanese police release decryptor for Phobos ransomware after February takedown
Fancy Bear Hackers Target Governments and Military Entities with Advanced Tools
Fancy Bear, designated as APT28 by cybersecurity experts, represents a sophisticated Russian cyberespionage collective operational since 2007, renowned for infiltrating governments, military organizations, and strategic entities globally. This group, also known under aliases such as Sofacy, Sednit, STRONTIUM, and Unit 26165, pursues motivations encompassing financial gain, reputational sabotage, espionage, and political agendas. Their operations frequently […]
The post Fancy Bear Hackers Target Governments and Military Entities with Advanced Tools appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Interlock
You must login to view this content
UNG0002 Group Hits China, Hong Kong, Pakistan Using LNK Files and RATs in Twin Campaigns
Russian alcohol retailer WineLab closes stores after ransomware attack
Китаю не нужен взлом — ему нужны кабели. США впервые ставят под сомнение физическую надёжность всего глобального интернета
Ivanti Flaws Exploited to Drop MDifyLoader and Launch In-Memory Cobalt Strike Attacks
Safepay
You must login to view this content
Snake Keylogger Bypasses Windows Defender and Uses Scheduled Tasks to Steal Credentials
Threat actors have been using a sophisticated phishing operation to impersonate Turkish Aerospace Industries (TUSAŞ) in order to attack Turkish businesses, especially those in the defense and aerospace sectors. The campaign distributes malicious emails masquerading as contractual documents, such as the file “TEKLİF İSTEĞİ – TUSAŞ TÜRK HAVACILIK UZAY SANAYİİ_xlsx.exe” with SHA256 hash 0cb819d32cb3a2f218c5a17c02bb8c06935e926ebacf1e40a746b01e960c68e4. This […]
The post Snake Keylogger Bypasses Windows Defender and Uses Scheduled Tasks to Steal Credentials appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.