Category: Cyber Attacks

Top Software Testing Services

Everything You Need To Know About SolarWinds Supply-Chain Attack

SolarWinds Cyber Security attack was a supply-chain attack that involved targeting a third-party organization that supplies products or services to the targeted organizations. In this case, SolarWinds was the third-party organization that provides System Management software to its Customers and Orion. Orion is a Network Management Tool that is quite a lot commonly used by…
Read more

Google Reveals That North Korean Hackers Are Targeting Security Researchers By Creating Fake Persona On Social Networks

As per Google’s recent Threat Analysis Group (TAG), a hacking group backed by the North Korean government has targeted cybersecurity researchers by leveraging their curiosity for the development of exploits and research for vulnerabilities. Google’s Threat Analysis Group is a security team of Google focused on hunting APT (Advanced Persistent Threat) groups. These bad actors…
Read more

A Tool Developed By A Cybercrime Group Creates Phishing Pages in Real-Time

A novel phishing toolkit has been developed by a cybercrime group that has the capabilities to change the logos and text of a phishing page in real-time to adjust with the environments of the targeted casualties. This phishing toolkit, named LogoKit, has already been conveyed in the wild as indicated by threat intelligence firm RiskIQ…
Read more

C-Suites Suffer Targeted Phishing Attacks

High-ranking company executives, generally known as C-Suites, from industries of real estate, government, finance, technology, and manufacturing are being widely targeted by specific developing phishing scam/operation which is under observation from around May 2020. This phishing scam involves a social engineering method/trick in which, the cybercriminals send fake emails to their targeted C-suites, claiming that…
Read more

Remote Access Worms Discovered In Laptops Being Distributed To British Schools

The Department of Education provides laptops to British schools to assist children in learning during the lockdown. According to the UK government’s recently started scheme, called Get Help With Technology (GHWT), laptops are distributed to schools and further to children. A recent shipment of laptops was discovered to be pre-installed with a malware, called Gamarue…
Read more

Another Ransom Attack On A Government Agency, Suffers Data Leak After Refusing To Pay Ransom

A government’s regulatory authority of Scotland focused on protecting the environment, known as SEPA (Scottish Environment Protection Agency), suffered a ransomware attack on the evening of last Christmas, in which the cybercriminal gang somehow stole around 1.2 GB of data that was in processing. The attackers/hackers responsible for this ransomware attack demanded a ransom in…
Read more

No Simple Fix For SolarWinds Supply Chain Attack – Says FireEye

The cybersecurity firm FireEye, who discovered the SolarWinds Supply Chain Attack, said that this almost seven-month-old cyber attack still remains in its early stage with no development in the analysis of the attack and tracing the intruder. This attack has massively and shockingly impacted the private and government sector of the US. On Tuesday, cybersecurity…
Read more

FBI Warns About Corporate Accounts Credentials Stealing Via Vishing Attacks

The FBI (Federal Bureau of Investigation) has released a warning notification about the actively ongoing vishing attacks that aim to gain corporate account login credentials for privilege escalation from employees and accessing their network. A vishing attack is a social engineering attack in which the victim is tried to trick in and give in confidential…
Read more

Going Rogue – A Different Level Of Malware Development Package

Smartphones, especially Android have remained an appealing subject for threat actors and cybercriminals for a very long period of time. There are more than 3.5 billion active users of smartphones, out of which 3 billion smartphones are Android-based. This massive worldwide use of smartphones is what makes cybercriminals target them for malicious activities. However, the…
Read more

Undocumented Chinese Malware Used In Recent Attacks Has Been Discovered By Cybersecurity Researchers

A progression of cyberattacks by a bad actor of Chinese root focused on associations in Russia and Hong Kong with malware that included a formerly undocumented backdoor was unveiled by Cybersecurity researchers. Linking the mission to Winnti (also known as APT41), Positive Technologies dated the primary assault to 12 May 2020, when the APT utilized…
Read more