Malware campaign attempts abuse of defender binaries
We are investigating a ransomware campaign that abuses legitimate Sophos executables and DLLs by modifying their original content, overwriting the...
We are investigating a ransomware campaign that abuses legitimate Sophos executables and DLLs by modifying their original content, overwriting the...
Using Legitimate GitHub URLs for Malware Interesting social-engineering attack vector: McAfee released a report on a new LUA malware loader...
In today’s digital landscape, distinguishing between legitimate communications and phishing attempts can feel like navigating a labyrinth blindfolded. Phishing is...
Mar 15, 2024NewsroomMalvertising / Threat Intelligence Chinese users looking for legitimate software such as Notepad++ and VNote on search engines...
More than 8,000 domains and 13,000 subdomains belonging to legitimate brands and institutions have been hijacked as part of a...
The next part of the infection chain involved the installation of an old but legitimate Node.js with a valid and...
FBI: Ransomware actors abuse third parties and legitimate system tools for initial access Pierluigi Paganini November 08, 2023 The FBI...
Oct 17, 2023NewsroomMalware / APT In what's the latest evolution of threat actors abusing legitimate infrastructure for nefarious ends, new...
It’s yet another example of how hackers are utilising legitimate services in what we call BEC 3.0 attacks. Business Email...
Sep 09, 2023THNMalware / Hacking A legitimate Windows tool used for creating software packages called Advanced Installer is being abused...
This QR code phishing campaign is targeting multiple industries and using legitimate services such as Microsoft Bing to increase its...
Aug 10, 2023THNMalware / Cyber Threat Malicious actors are using a legitimate Rust-based injector called Freezers to deploy a commodity...
Jul 28, 2023THNMalware / Cyber Threat A legitimate Windows search feature is being exploited by malicious actors to download arbitrary...
We did not search further, as the URL is self-explanatory. It is likely that the legitimate E-Office application connects to...