8220 Gang Evolves With New Strategies

Credit to Author: Sunil Bharti| Date: Tue, 16 May 2023 00:00:00 +0000

We observed the threat actor group known as “8220 Gang” employing new strategies for their respective campaigns, including exploits for the Linux utility “lwp-download” and CVE-2017-3506, an Oracle WebLogic vulnerability.

Read more

Attackers Use Containers for Profit via TrafficStealer

Credit to Author: Alfredo Oliveira| Date: Wed, 26 Apr 2023 00:00:00 +0000

We found TrafficStealer abusing open container APIs in order to redirect traffic to specific websites and manipulate engagement with ads.

Read more

Mac Malware MacStealer Spreads as Fake P2E Apps

Credit to Author: Qi Sun| Date: Thu, 30 Mar 2023 00:00:00 +0000

We detected Mac malware MacStealer spreading via websites, social media, and messaging platforms Twitter, Discord, and Telegram. Cybercriminals lure victims to download it by plagiarizing legitimate play-to-earn (P2E) apps’ images and offering jobs as beta testers.

Read more

Iron Tiger’s SysUpdate Reappears, Adds Linux Targeting

Credit to Author: Daniel Lunghi| Date: Wed, 01 Mar 2023 00:00:00 +0000

We detail the update that advanced persistent threat (APT) group Iron Tiger made on the custom malware family SysUpdate. In this version, we also found components that enable the malware to compromise Linux systems.

Read more

Invitation to a Secret Event: Uncovering Earth Yako’s Campaigns

Credit to Author: Hara Hiroaki| Date: Thu, 16 Feb 2023 00:00:00 +0000

We detail the intrusion set Earth Yako, attributed to the campaign Operation RestyLink or EneLink. This analysis was presented in full at the JSAC 2023 in January 2023.

Read more

Hijacking Your Bandwidth: How Proxyware Apps Open You Up to Risk

Credit to Author: Trend Micro Research| Date: Tue, 07 Feb 2023 00:00:00 +0000

In this investigation, we analyzed several prominent “passive income” applications and found out that there may be security risks upon participating in these programs.

Read more

DeimosC2: What SOC Analysts and Incident Responders Need to Know About This C&C Framework

Credit to Author: Feike Hacquebord| Date: Tue, 08 Nov 2022 00:00:00 +0000

This report provides defenders and security operations center teams with the technical details they need to know should they encounter the DeimosC2 C&C framework.

Read more