Tag: Cyberattack

Detect Mars Stealer Cryptojacking Malware
Detect Mars Stealer Cryptojacking Malware

On March 30, 2022, the Computer Emergency Response Team of Ukraine (CERT-UA) put out a warning of a mass spread of malware named “Mars Stealer” targeting individuals and organizations in Ukraine. According to the CERT-UA research, adversaries behind Mars Stealer attacks are traced back to the hacking group tracked as UAC-0041 (associated with AgentTesla and […]

Read More
Colibri Loader Malware Detection: Unusual Persistence Using PowerShell
Colibri Loader Malware Detection: Unusual Persistence Using PowerShell

A malware loader Colibri that appeared not so long time ago – in August 2021, has been recently discovered delivering Vidar payloads in a new ongoing Colibri Loader campaign. Researchers indicate that Colibri uses an unusual persistence technique that hasn’t been tracked until this time. Updated functionality motivates adversaries to keep selling their new malware […]

Read More
Armageddon Cyber Espionage Group Tracked As UAC-0010 Attacks EU and Ukrainian Government Entities
Armageddon Cyber Espionage Group Tracked As UAC-0010 Attacks EU and Ukrainian Government Entities

Update: According to the latest heads-up from Arpil 7, 2022, the Computer Emergency Response Team of Ukraine (CERT-UA) issued an alert with the details of the most recent phishing attack on Ukrainian state bodies hard on the heels of the attack kill chain a couple of days ago identified by the similar behavior patterns.  On […]

Read More
IcedID Malware Hijacks Email Threads Delivering Unseen Payload
IcedID Malware Hijacks Email Threads Delivering Unseen Payload

A sudden surge in the activity of IcedID email hijacking was identified by security researchers. IcedID, a.k.a. BokBot has been operating since 2017. A gradual evolution has led this malware from being a regular banking trojan to a sophisticated payload that hijacks ongoing email conversations and injects malicious code through a network of compromised Microsoft […]

Read More
New FatalRAT Model: Purple Fox Hackers Are Increasing Their Botnet Infrastructure
New FatalRAT Model: Purple Fox Hackers Are Increasing Their Botnet Infrastructure

Purple Fox malware has been wreaking all sorts of havoc on personal computers since 2018, infecting more than 30,000 machines globally. The latest studies found that Purple Fox hackers continue improving their infrastructure and adding new backdoors. To expand the botnet scale, Purple Fox is spreading trojanized installers that masquerade as legitimate software packages. The […]

Read More
Muhstik Botnet Detection: Infamous Gang Resurfaces with New Behavior Attacking Redis Servers
Muhstik Botnet Detection: Infamous Gang Resurfaces with New Behavior Attacking Redis Servers

The Muhstik botnet has been around since 2018, continuously expanding the map of its victims, hitting new services and platforms, and diversifying its range of attacks, including coin mining activities, staging DDoS attacks, or exploiting the infamous vulnerabilities in the Log4j Java library. This time, the notorious malware gang has been actively exploiting a Lua […]

Read More
MicroBackdoor Malware: Belarusian APT Group UNC1151 (UAC-0051) Targets Ukrainian Government
MicroBackdoor Malware: Belarusian APT Group UNC1151 (UAC-0051) Targets Ukrainian Government

This article highlights the original research conducted by CERT-UA: https://cert.gov.ua/article/37626  On March 7, 2022, the Computer Emergency Response Team for Ukraine (CERT-UA) issues an urgent warning detailing an ongoing spear-phishing campaign executed against private emails of Ukrainian officials, including the Ukrainian armed forces personnel. With a high level of confidence, CERT-UA attributes the malicious operation […]

Read More
LAPSUS$ Digital Extortion Gang Claims Microsoft’s Data Leak: Breach Affected Okta Customers
LAPSUS$ Digital Extortion Gang Claims Microsoft’s Data Leak: Breach Affected Okta Customers

On March 21, 2022, LAPSUS$ gang published a series of posts in their Telegram channel displaying screenshots of what they called Microsoft Bing and Cortana visual assistant source code. Besides 40 Gb of leaked data, they also showed a compromised administrative account of Okta, a platform that provides digital identity verification for individuals and organizations. […]

Read More
Threat Actors Leverage Spear-Phishing E-Mails Mimicking UKR.NET Service for Espionage
Threat Actors Leverage Spear-Phishing E-Mails Mimicking UKR.NET Service for Espionage

This article highlights the original research provided by CERT-UA: https://cert.gov.ua/article/37788  On March 16, 2022, the Computer Emergency Response Team from Ukraine CERT-UA identified a spear-phishing campaign aimed at infecting Ukrainian organizations with cyber-espionage malware. With a low level of confidence, given the tactics used, CERT-UA associates the identified activity with one of the top Russia-backed […]

Read More
HeaderTip Malware Hits Ukrainian Organizations: CERT-UA Warning
HeaderTip Malware Hits Ukrainian Organizations: CERT-UA Warning

On March 22, 2022, the Computer Emergency Response Team of Ukraine (CERT-UA) identified yet another nefarious malware targeting the infrastructure of Ukrainian state bodies and organizations across the country. Dubbed HeaderTip, the malicious strain is typically leveraged to drop additional DLL files to the infected instance.The revealed malicious activity is tracked under the UAC-0026 identifier, […]

Read More