Unveiling Cybercriminals Malware Concealment Techniques

A new malware obfuscation engine called BatCloak just got discovered after remaining fully undetectable for a period. It has enabled threat actors to deploy different types of malware while avoiding detection by antivirus systems. Researchers from Trend Micro have found that 79.6% of the 784 artefacts analyzed were not detected by any security solutions, indicating BatCloak’s […]

Unveiling Cybercriminals Malware Concealment Techniques

A new malware obfuscation engine called BatCloak just got discovered after remaining fully undetectable for a period. It has enabled threat actors to deploy different types of malware while avoiding detection by antivirus systems. Researchers from Trend Micro have found that 79.6% of the 784 artefacts analyzed were not detected by any security solutions, indicating BatCloak’s […]

How the CLOP Ransomware Gang Exploited the MoveIT Transfer Vulnerability

The Cl0p Ransomware Gang, active since at least February 2019, has become a significant player in the cybercrime landscape. It operates as a ransomware-as-a-service (RaaS), participates in affiliate programs, brokers initial access to compromised networks, and collaborates with other actors in the ecosystem. By exploiting the SQL injection vulnerability (CVE-2023-34362) in MOVEit Transfer, the Cl0p […]

How the CLOP Ransomware Gang Exploited the MoveIT Transfer Vulnerability

The Cl0p Ransomware Gang, active since at least February 2019, has become a significant player in the cybercrime landscape. It operates as a ransomware-as-a-service (RaaS), participates in affiliate programs, brokers initial access to compromised networks, and collaborates with other actors in the ecosystem. By exploiting the SQL injection vulnerability (CVE-2023-34362) in MOVEit Transfer, the Cl0p […]

The New Turkorat Malware Hidden in Malicious NPM Packages

A recent discovery showed two npm packages harbour a dangerous information-stealing malware known as TurkoRat, shedding light on the ongoing risks associated with open-source supply chain attacks. The packages in question, nodejs-encrypt-agent, and nodejs-cookie-proxy-agent, had been downloaded approximately 1,200 times before being identified and removed after two months. Cybersecurity firm ReversingLabs analyzed the campaign and […]

The New Turkorat Malware Hidden in Malicious NPM Packages

A recent discovery showed two npm packages harbour a dangerous information-stealing malware known as TurkoRat, shedding light on the ongoing risks associated with open-source supply chain attacks. The packages in question, nodejs-encrypt-agent, and nodejs-cookie-proxy-agent, had been downloaded approximately 1,200 times before being identified and removed after two months. Cybersecurity firm ReversingLabs analyzed the campaign and […]

New Zaraza Stealer Targets 36 Web Browsers

Uptycs, a cybersecurity firm, has recently released a statement that highlights a concerning new development in the world of cybercrime. According to Uptycs, Zaraza, a well-known malware that steals sensitive information, has found a new market on a popular Russian Telegram channel for hackers. Threat actors frequent the channel, and the malware targets many web […]

New Zaraza Stealer Targets 36 Web Browsers

Uptycs, a cybersecurity firm, has recently released a statement that highlights a concerning new development in the world of cybercrime. According to Uptycs, Zaraza, a well-known malware that steals sensitive information, has found a new market on a popular Russian Telegram channel for hackers. Threat actors frequent the channel, and the malware targets many web […]