Tag: Novel
-
Redline Stealer: A Novel Approach
A new packed variant of the Redline Stealer trojan was observed in the wild, leveraging Lua bytecode to perform malicious behavior. McAfee …
-
Russian Sandworm Group Using Novel Backdoor to Target Ukraine and Allies
Russian nation-state group Sandworm is believed to be utilizing a novel backdoor to target organizations in Ukraine and other Eastern and …
-
Novel C2 tool leveraged in latest MuddyWater attacks
Iranian state-backed threat operation MuddyWater, also known as TA450, Mango Sandstorm, and Boggy Sandstorm, leveraged the novel DarkBeatC2 …
-
Novel malware enables C2 communications by exploiting GTP
Security researchers say a newly discovered Linux malware dubbed GTPDOOR can establish command-and-control communications in compromised …
-
Novel Wi-Fi flaw could trigger widespread hacks, experts
Android, ChromeOS, and Linux devices are being impacted by a pair of authentication bypass vulnerabilities within open-source Wi-Fi …
-
Novel Migo malware impacts Redis servers
Redis servers have been subjected to attacks with the novel Migo malware meant to facilitate cryptomining on Linux hosts, reports The …
-
Novel backdoor used in Charming Kitten attacks
Novel backdoor used in Charming Kitten attacks Attacks involving the new BASICSTAR backdoor have been deployed by Iranian advanced …
-
Novel backdoor leveraged in Turla attacks
Attacks with the novel TinyTurla-NG backdoor have been deployed by Russian state-backed threat operation Turla, also known as Secret …
-
Novel RustDoor macOS malware fueled by ransomware infrastructure
Three command-and-control servers previously linked to the ALPHV/BlackCat and Black Basta ransomware operations have been leveraged to …
-
Novel Go-based malware strains used in Kimsuky attacks
Recent attacks by North Korean state-sponsored hacking group Kimsuky, also known as APT43, Emerald Sleet, and Velvet Chollima, have …
-
Novel cryptojacking campaign targets Docker APIs
Threat actors have targeted internet-exposed Docker API endpoints with the advanced Commando Cat cryptojacking campaign since the beginning …
●●●