Threat Actors

Silver Fox Impersonates Russian Hackers in Tactical SEO Poisoning Campaign
Cybersecurity
Silver Fox Impersonates Russian Hackers in Tactical SEO Poisoning Campaign
Silver Fox orchestrates deceptive tactics by emulating a Russian hacking group in an SEO poisoning campaign, targeting Chinese organizations. Utilizing Microsoft Teams lures, the campaign ...
Intellexa's Predator Spyware Exploits Zero-click 'Aladdin' Mechanism in Targeted Attacks
Cybersecurity
Intellexa’s Predator Spyware Exploits Zero-click ‘Aladdin’ Mechanism in Targeted Attacks
Intellexa's Predator spyware employs a zero-click infection method named 'Aladdin,' allowing malware to spread via malicious ads. The sophistication of this method underscores the evolving ...
Water Saci Threat Actor Evolves Tactics with Sophisticated Infection Chain
News
Water Saci Threat Actor Evolves Tactics with Sophisticated Infection Chain
The Water Saci threat actor has evolved its tactics, utilizing an advanced infection chain with HTML Application files and PDFs. These methods are used to ...
North Korea's Covert IT Workforce Exposed Unmasking the Chollima Scheme
Cybersecurity
North Korea’s Covert IT Workforce Exposed: Unmasking the Chollima Scheme
A joint investigation by BCA LTD, NorthScan, and ANY.RUN reveals North Korea's persistent infiltration scheme. The study exposes remote IT workers linked to the Lazarus ...
Young Cybercriminals Rebels Without a Cause in the Digital World
Cybersecurity
Young Cybercriminals: Rebels Without a Cause in the Digital World
Emerging data reveals most young cybercriminals outgrow illicit activities by age 20. This shift signals their maturation process beyond digital crime, although a few remain ...
ShadyPanda Malware Exploits Browser Extensions for Mass Infiltration
Application Security
ShadyPanda Malware Exploits Browser Extensions for Mass Infiltration
ShadyPanda malware campaign has quietly infiltrated over 4.3 million installations of Chrome and Edge browser extensions. It deceived users by masquerading as legitimate tools, allowing ...
North Korean Threat Actors Intensify Efforts with Malicious npm Packages
Cybersecurity
North Korean Threat Actors Intensify Efforts with Malicious npm Packages
North Korea-linked threat actors continue aggressive activity with the addition of 197 malicious npm packages. These deployments have reached over 31,000 downloads and deliver a ...
British Telco Brsk Under Cybersecurity Scrutiny Amid Claims of Data Breach
Cybersecurity
British Telco Brsk Under Cybersecurity Scrutiny Amid Claims of Data Breach
Brsk, a British telecommunications company, finds itself embroiled in a cybersecurity investigation following claims of a data breach involving over 230,000 files. Cybercriminals allege they ...
Bloody Wolf's Cyber Offensive A Deep Dive into Targeted Attacks in Central Asia
Cybersecurity
Bloody Wolf’s Cyber Offensive: A Deep Dive into Targeted Attacks in Central Asia
The Bloody Wolf cyber threat group has launched a methodical campaign to deliver NetSupport RAT in Kyrgyzstan and Uzbekistan, revealing a calculated expansion in its ...
Russian-linked Campaign Distributes StealC V2 Malware via Sketchy Blender Files
Data Security
Russian-linked Campaign Distributes StealC V2 Malware via Sketchy Blender Files
Russian cyber perpetrators craftily embed StealC V2 malware within Blender files. These files, hosted on popular 3D model marketplaces, pose a sophisticated threat to digital ...