Aggregator
Rockstar2FA Collapse Fuels Expansion of FlowerStorm Phishing-as-a-Service
Skuld Malware Using Weaponized Windows Utilities Packages To Deliver Malware
Researchers discovered a malware campaign targeting the npm ecosystem, distributing the Skuld info stealer through malicious packages disguised as legitimate tools. The threat actor, “k303903,” compromised hundreds of machines before the packages were removed. Subsequent analysis revealed that “k303903” likely operates under the aliases “shegotit2” and “pressurized,” all exhibiting identical or highly similar tactics, techniques, […]
The post Skuld Malware Using Weaponized Windows Utilities Packages To Deliver Malware appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
CVE-2000-0218 | SuSE Linux 2.3 mount/umount Long Path memory corruption (EDB-321 / XFDB-7156)
LockBit 开发人员 Rostislav Panev 被控在全球勒索软件中造成数十亿美元损失
BellaCiao, A new .NET Malware With Advanced Sophisticated Techniques
An investigation revealed an intrusion in Asia involving the BellaCiao .NET malware, as the initial sample (MD5 14f6c034af7322156e62a6c961106a8c) provided valuable insights into its version and development timeline. A second suspicious sample on the same machine, while exhibiting similar functionality to BellaCiao, was a C++ reimplementation of an older version, suggesting a potential evolution in the […]
The post BellaCiao, A new .NET Malware With Advanced Sophisticated Techniques appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.