New Golang Ransomware Agenda Customizes Attacks

Credit to Author: Mohamed Fahmy| Date: Thu, 25 Aug 2022 00:00:00 +0000

A new piece of ransomware written in the Go language has been targeting healthcare and education enterprises in Asia and Africa. This ransomware is called Agenda and is customized per victim.

Read more

Ransomware Actor Abuses Genshin Impact Anti-Cheat Driver to Kill Antivirus

Credit to Author: Ryan Soliven| Date: Wed, 24 Aug 2022 00:00:00 +0000

We investigate mhyprot2.sys, a vulnerable anti-cheat driver for the popular role-playing game Genshin Impact. The driver is currently being abused by a ransomware actor to kill antivirus processes and services for mass-deploying ransomware.

Read more

What Exposed OPA Servers Can Tell You About Your Applications

Credit to Author: Magno Logan| Date: Tue, 16 Aug 2022 00:00:00 +0000

This blog entry discusses what an OPA is and what it’s for, what we’ve discovered after identifying 389 exposed OPA servers via Shodan, and how exposed OPAs can negatively impact your applications’ overall security.

Read more

Forecasting Metaverse Threats: Will it Become Metaworse?

Credit to Author: Trend Micro Research| Date: Tue, 09 Aug 2022 00:00:00 +0000

This report shares threat predictions concerning a rapidly evolving area of the physical and digital word – the metaverse. We refine our definition of the metaverse, while identifying threats against it and inside it.

Read more

SolidBit Ransomware Enters the RaaS Scene and Takes Aim at Gamers and Social Media Users With New Variant

Credit to Author: Nathaniel Morales| Date: Tue, 02 Aug 2022 00:00:00 +0000

This blog entry offers a technical analysis of a new SolidBit variant that is posing as different applications to lure gamers and social media users. The SolidBit ransomware group appears to be planning to expand its operations through these fraudulent apps and its recruitment of ransomware-as-a-service affiliates.

Read more

Alibaba OSS Buckets Compromised to Distribute Malicious Shell Scripts via Steganography

Credit to Author: Alfredo Oliveira| Date: Thu, 21 Jul 2022 00:00:00 +0000

In this blog entry, we discuss a malicious campaign that targets Alibaba Cloud’s OSS buckets with leaked credentials for malware distribution and cryptojacking.

Read more

Analyzing Penetration-Testing Tools That Threat Actors Use to Breach Systems and Steal Data

Credit to Author: Joelson Soares| Date: Wed, 20 Jul 2022 00:00:00 +0000

We discovered the use of two Python penetration-testing tools, Impacket and Responder, that malicious actors used to compromise systems and exfiltrate data. We share our key findings in this report.

Read more