BADBOX botnet hacked 74,000 Android devices with remote codes
BADBOX is a cybercriminal operation that infects Android devices, like TV boxes and smartphones, with malware before they are sold. These devices, often sold through trusted retailers, pose a major [...]
Malicious supply chain attacks shift from npm to VSCode Marketplace
Researchers have observed a rise in malicious activity on the VSCode Marketplace, exposing its vulnerability to supply chain attacks similar to those previously seen in the npm community. Malicious actors [...]
Careto: A Notorious Threat Group Targets Windows with Microphone Recording and File Theft
Recent research links The Mask group to a 2022 attack on a Latin American organization, exploiting an MDaemon email server and WorldClient webmail for persistent access. The initial compromise method [...]
New VIPKeyLogger in Office Docs Steals Credentials
VIPKeyLogger, similar to the Snake Keylogger, spreads through phishing campaigns via attachments disguised as archive or Microsoft 365 files. It uses malicious Office documents to connect to C2 servers and [...]
Hackers Exploit Windows Management Console for Backdoor Payloads
The FLUX#CONSOLE campaign exploits .MSC files to deploy backdoor malware, highlighting advanced phishing and Windows feature abuse. The FLUX#CONSOLE campaign is a multi-stage attack aimed at delivering backdoor malware. It [...]





Get Social