The threat group has leaked data that it claims was stolen in the breach and is promising more government-targeted attacks. Source: Read More (Threatpost)
ThreatPost
[ThreatPost] Low-rent RAT Worries Researchers
Researchers say a hacker is selling access to quality malware for chump change. Source: Read More (Threatpost)
[ThreatPost] FBI: Rise in Business Email-based Attacks is a $43B Headache
A huge spike in fraudulent activities related to attacks leveraging business email accounts is a billion-dollar-problem. Source: Read More (Threatpost)
[ThreatPost] Podcast: The State of the Secret Sprawl
In this podcast with Mackenzie Jackson, developer advocate at GitGuardian, we dive into the report and also the issues that corporations face with public leaks from groups like Lapsus and more, as well as ways that developers can keep their code safe. Source: Read More (Threatpost)
[ThreatPost] USB-based Wormable Malware Targets Windows Installer
Activity dubbed ‘Raspberry Robin’ uses Microsoft Standard Installer and other legitimate processes to communicate with threat actors and execute nefarious commands. Source: Read More (Threatpost)
[ThreatPost] CANs Reinvent LANs for an All-Local World
A close look at a new type of network, known as a Cloud Area Network. Source: Read More (Threatpost)
[ThreatPost] F5 Warns of Critical Bug Allowing Remote Code Execution in BIG-IP Systems
The vulnerability is ‘critical’ with a CVSS severity rating of 9.8 out of 10. Source: Read More (Threatpost)
[ThreatPost] VHD Ransomware Linked to North Korea’s Lazarus Group
Source code and Bitcoin transactions point to the malware, which emerged in March 2020, being the work of APT38, researchers at Trellix said. Source: Read More (Threatpost)
[ThreatPost] China-linked APT Caught Pilfering Treasure Trove of IP
A state-sponsored threat actor designed a house-of-cards style infection chain to exfiltrate massive troves of highly sensitive data. Source: Read More (Threatpost)
[ThreatPost] Attackers Use Event Logs to Hide Fileless Malware
A sophisticated campaign utilizes a novel anti-detection method. Source: Read More (Threatpost)