Search

Showing 1674 results for: "command-and-control".

OPSEC lapse reveals hub for amateur cybercriminals
An amateur hacker’s operational security error enabled researchers to uncover more details about a cybercrime operation utilizing the Proton66 bulletproof hosting service, DomainTools reported Thursday.   The threat actor known as “Coquettte” was uncovered by DomainTools while investigating...
Multiple backdoors spread through fake AI, business tools
An attack campaign using DeepSeek, AutoCAD, UltraViewer and other business apps as phishing lures was found spreading three different backdoors for remote access to victims’ systems, Kaspersky revealed in a blog post Wednesday. One of the malware strains, known as TookPS, was previously discover...
NSA: ‘Fast Flux’ DNS evasion technique now a national security threat
In what some experts are calling a “big-time wakeup call” to security teams globally, a joint advisory was issued April 3 by government officials in the United States, Australia, Canada, and New Zealand warning that threat actors are using the well-known “fast flux” technique to change domain name ...
Covert compromise facilitated by new crop of malware loaders
More advanced obfuscation techniques have been adopted by a new Hijack Loader malware variant, the SHELBY malware, and the Emmenhtal Loader to facilitate clandestine compromise, according to The Hacker News. After being spread via code-signing certificates and the ClickFix attack technique, ...
EDR killer links RansomHub with Play, Medusa, BianLian gangs
A security evasion tool from the RansomHub malware group has been used by ESET researchers to trace and connect attacks conducted by three other cybercrime groups. The findings, published Wednesday, show how use of RansomHub’s custom endpoint detection and response (EDR) tool EDRKillShifter has ...
Leaked Black Basta chat logs indicate ties to Russian officials
An analysis of over 200,000 leaked internal messages from the Black Basta ransomware group covering September 2023 to September 2024 has revealed potential links to Russian authorities and detailed insights into the groups cyber operations, The Hacker News reports. One of the most significan...
Evolving Raspberry Robin IAB operations uncovered
More than 180 unique command-and-control domains have been leveraged in attacks by the Raspberry Robin threat operation, also known as Storm-0856 and Roshtyak, indicating its evolution from a Windows worm to an initial access broker, The Hacker News reports. Despite having been utilized to f...

You can skip this ad in 5 seconds