Unraveling AsyncRAT: A Deep Dive into Phishing Email Threats On August 29, 2024, eSentire’s Threat Response Unit (TRU) released a bulletin detailing a recent investigation into an AsyncRAT infection delivered through phishing emails.
BlackByte Ransomware Exploits New VMware ESXi Vulnerability in Latest Attack On August 28, 2024, Cisco Talos Incident Response (Talos IR) released a detailed threat spotlight report on the BlackByte ransomware group, revealing the group's adaptation of newly disclosed vulnerabilities to enhance their attack capabilities.
Iran-Based Cyber Actors Enabling Ransomware Attacks on US Organizations Iran-based cyber actors are believed to be affiliated with the Government of Iran (GOI), have been conducting cyber intrusions targeting US organizations.
Russian National Arrested in Argentina for Laundering Illicit Crypto Proceeds Introduction On August 22, 2024, Argentinian authorities arrested a Russian national involved in a sophisticated money-laundering operation, which seized millions of dollars in cryptocurrency and assets. The investigation, led by the San Isidro Specialized Fiscal Unit in Cybercrime Investigations (UFEIC) and supported by TRM Labs, uncovered a complex network of
Advanced Persistent Threat Targets Vietnamese Human Rights Defenders with Sophisticated Malware Campaign On August 28, 2024, cybersecurity firm Huntress released a detailed report uncovering a prolonged and sophisticated cyber espionage campaign targeting Vietnamese human rights defenders. The intrusion, believed to have been ongoing for at least four years
ESET Uncovers Two Critical Code Execution Vulnerabilities in WPS Office, Exploited by APT-C-60 South Korea-aligned cyber espionage group APT-C-60 has exploited these vulnerabilities to target individuals in East Asian countries. ESET's research has uncovered the technical nuances of these exploits
EDR Killer Tool ‘Poortry’ Evolving: Now Targets Critical Windows Security Components On August 27, 2024, Sophos X-Ops released an in-depth report detailing the continued evolution of the ‘Poortry’ toolset, a malicious EDR (Endpoint Detection and Response) killer used by several ransomware gangs.