A new variant of the sophisticated attacker tool gives cybercriminals even more control over victim devices to conduct various malicious activities, including fraud and cyber espionage.
Автор: Elizabeth Montalbano, Contributing Writer
FBI, Partners Disrupt RedLine, Meta Stealer Operations
A collaboration with the FBI and law-enforcement agencies in Europe, the UK, and Australia, Operation Magnus has seized servers and source code related to the two malware families, which have stolen data from millions of victims worldwide.
Mobile Apps With Millions of Downloads Expose Cloud Credentials
Popular titles on both Google Play and Apple’s App Store include hardcoded and unencrypted AWS and Azure credentials in their codebases or binaries, making them vulnerable to misuse by threat actors.
Swarms of Fake WordPress Plug-ins Infect Sites With Infostealers
GoDaddy flagged a ClickFix campaign that infected 6,000 sites in a one-day period, with attackers using stolen admin credentials to distribute malware.
Anti-Bot Services Help Cybercrooks Bypass Google ‘Red Page’
The emergence of novel anti-detection kits for sale on the Dark Web limit the effectiveness of a Chrome browser feature that warns users that they have reached a phishing page.
Sidewinder Casts Wide Geographic Net in Latest Attack Spree
The long-active, India-sponsored cyber-threat group targeted multiple entities across Asia, Africa, the Middle East, and even Europe in a recent attack wave that demonstrated the use of a previously unknown post-exploit tool called StealerBot.
Cyberattackers Unleash Flood of Potentially Disruptive Election-Related Activity
Organizations should be on high alert until next month’s US presidential election to ensure the integrity of the voting process, researchers warn.
ConfusedPilot Attack Can Manipulate RAG-Based AI Systems
Attackers can introduce a malicious document in systems such as Microsoft 365 Copilot to confuse the system, potentially leading to widespread misinformation and compromised decision-making processes.
Microsoft: Creative Abuse of Cloud Files Bolsters BEC Attacks
Since April, attackers have increased their use of Dropbox, OneDrive, and SharePoint to steal the credentials of business users and conduct further malicious activity.
American Water Suffers Network Disruptions After Cyberattack
The largest publicly traded water utility in the US was forced to disconnect some of its online systems, and its website and telecommunications system remained unavailable as of Tuesday morning, Oct. 8.