News

Trickbot Operators Find the Way to Abuse RDP ActiveX Control for Malware Delivery

Delaware, USA – March 2, 2020 – One of the most dangerous malware received the updated downloader that abuses RDP ActiveX control in order to successfully infect Windows 10 systems. Morphisec Labs researchers discovered multiple documents that execute the javascript downloader to deploy TrickBot malware on the victim’s system. Adversaries use OSTAP downloader since August […]

NRC Health Suffers Ransomware Attack

Delaware, USA – February 28, 2020 – NRC Health suffered a ransomware attack on February 11, and the company could not confirm whether any sensitive data was stolen by the attackers. NRC Health is a Lincoln company that offers performance measurement and management services for health care companies, the company works with three fourth of […]

Attackers Look Around for Microsoft Exchange Servers Vulnerable to CVE-2020-0688

Delaware, USA – February 27, 2020 – Just a day after the publication of technical details about the flaw, adversaries began to actively scan the Internet in search of vulnerable Microsoft Exchange Servers. CVE-2020-0688 is a remote code execution flaw, and the latest Microsoft Patch Tuesday contained an update to fix it. “A remote code […]

Mozart Malware Receives Instructions via DNS

Delaware, USA – February 26, 2020 – Using DNS traffic for command-and-control communications by advanced threat actors is not uncommon. Furthermore, more and more malware has been switching to DNS-over-HTTPS traffic, and this is reasonable, given that this protocol will be used by popular browsers by default soon and Mozilla has already enabled this feature […]

ObliqueRAT Malware is Used in Attacks on Government Organizations

Delaware, USA – February 25, 2020 – ObliqueRAT trojan is used in an ongoing campaign targeted at diplomatic and government organizations in Southeast Asia. The campaign was spotted by Cisco Talos researchers, the detailed analysis of the malware and techniques used points to CrimsonRAT distributors, a cyberespionage group operating in the same region, as primary […]

UnderDefense and SOC Prime Partner to Deliver the world’s largest marketplace for Threat Detection Rules and Queries

San Francisco, USA – February 24, 2020 – UnderDefense, a leader in supporting organizations around the world to plan, manage, and run successful Security Operations today announced a strategic partnership with SOC Prime, the leader in providing threat detection content. UnderDefense’s extensive industry knowledge in cybersecurity will now be able to leverage SOC Prime’s library of threat […]

Ransomware Attack Stymies Operations of INA Group

Delaware, USA – February 21, 2020 – Croatia’s largest petrol station chain and biggest oil company, INA Group was hit by a cyberattack on Friday, February 14. Ransomware encrypted some of the company’s backend servers impacting its ability to register loyalty card use, allow customers to pay gas utility bills, issue invoices, issue new mobile […]

Loda Trojan Receives New Features

Delaware, USA – February 14, 2020 – The Loda Remote Access Trojan was recently significantly improved by the authors and is actively used in a campaign targeting the Americas. The trojan appeared in 2016, and it is capable of keylogging, stealing system and user information, taking screenshots, starting and killing processes, and installing other malicious […]

MoleRATs Group Added Pierogi Backdoor to Their Toolkit

Delaware, USA – February 13, 2020 – MoleRATs group uses new backdoors in cyberspying campaigns targeting victims, organizations and individuals, mainly from the Palestinian territories. Cybereason Nocturnus team tracked two separate campaigns happening simultaneously but differing in tools, server infrastructure, and nuances in decoy content and intended targets. MoleRATs group is one of the Gaza […]

KBOT Virus Spreads Through Injecting Code into Executables

Delaware, USA – February 12, 2020 – In recent years, classically viruses have become a thing of the past, now fileless malware, abuse of Cloud Services, and steganography are in fashion. The arms race between cybercriminals and cybersecurity vendors is in full play, but relics of the past every once in a while are brought […]