Tag: Phishing

UAC-0001 (APT28) Attack Detection: The russia-Backed Actor Uses LLM-Powered LAMEHUG Malware to Target Security and Defense Sector  4 min read Latest Threats UAC-0001 (APT28) Attack Detection: The russia-Backed Actor Uses LLM-Powered LAMEHUG Malware to Target Security and Defense Sector  by Veronika Telychko Mocha Manakin Attack Detection: Hackers Spread a Custom NodeJS Backdoor Dubbed NodeInitRAT Using the Paste-and-Run Technique  4 min read Latest Threats Mocha Manakin Attack Detection: Hackers Spread a Custom NodeJS Backdoor Dubbed NodeInitRAT Using the Paste-and-Run Technique  by Veronika Telychko Uncoder AI Visualizes Threat Behavior with Automated Attack Flow 2 min read SOC Prime Platform Uncoder AI Visualizes Threat Behavior with Automated Attack Flow by Steven Edwards UAC-0226 Attack Detection: New Cyber-Espionage Campaign Targeting Ukrainian Innovation Hubs and Government Entities with GIFTEDCROOK Stealer 3 min read Latest Threats UAC-0226 Attack Detection: New Cyber-Espionage Campaign Targeting Ukrainian Innovation Hubs and Government Entities with GIFTEDCROOK Stealer by Veronika Telychko UAC-0219 Attack Detection: A New Cyber-Espionage Campaign Using a PowerShell Stealer WRECKSTEEL 3 min read Latest Threats UAC-0219 Attack Detection: A New Cyber-Espionage Campaign Using a PowerShell Stealer WRECKSTEEL by Veronika Telychko Gamaredon Campaign Detection: russia-backed APT Group Targets Ukraine Using LNK Files to Spread Remcos Backdoor 4 min read Latest Threats Gamaredon Campaign Detection: russia-backed APT Group Targets Ukraine Using LNK Files to Spread Remcos Backdoor by Veronika Telychko UAC-0173 Activity Detection: Hackers Launch Phishing Attacks Against Ukrainian Notaries Using the DARKCRYSTALRAT Malware 3 min read Latest Threats UAC-0173 Activity Detection: Hackers Launch Phishing Attacks Against Ukrainian Notaries Using the DARKCRYSTALRAT Malware by Veronika Telychko TorNet Backdoor Detection: An Ongoing Phishing Email Campaign Uses PureCrypter Malware to Drop Other Payloads 4 min read Latest Threats TorNet Backdoor Detection: An Ongoing Phishing Email Campaign Uses PureCrypter Malware to Drop Other Payloads by Veronika Telychko Interesting URL Schema Abuse Patterns (Merry Phishmas) 2 min read Knowledge Bits Interesting URL Schema Abuse Patterns (Merry Phishmas) by John Stevens PXA Stealer Detection: Vietnamese Hackers Hit the Public and Education Sectors in Europe and Asia 4 min read Latest Threats PXA Stealer Detection: Vietnamese Hackers Hit the Public and Education Sectors in Europe and Asia by Veronika Telychko