Instead of sending fake invoices or money transfer requests, attackers attempt to ‘purchase’ high-value goods such as construction materials, agricultural supplies, IT hardware, and solar energy products.
In the new campaign found by Intezer, Bitter sends emails pretending to be from the Embassy of Kyrgyzstan in Beijing to various Chinese nuclear energy companies and academics related to that field.
On March 16, 2022, about a month after the FBI took down a popular online forum for buying and selling stolen data known as RaidForums, another criminal marketplace quickly sprung up to take its place.
American university researchers have developed a novel attack called “Near-Ultrasound Inaudible Trojan” (NUIT) that can launch silent attacks against devices powered by voice assistants, like smartphones, smart speakers, and other IoTs.
Azure network defenders can use the tool to export and review sign-in audit logs and activity alerts from a range of Azure and Microsoft Defender environments to pinpoint signs of suspicious activity.
The attack has not resulted in the breach of any data and court operations are continuing as usual statewide, state Supreme Court Chief Justice Annette Ziegler said in a statement.
Cyble Research and Intelligence Labs uncovered a new Malware-as-a-Service (MaaS) platform called Cinoshi. Its arsenal includes a stealer, botnet, clipper, and cryptominer. The stealer collects cards, cookies, and credentials from popular browsers including Chromium, Edge, and Gecko. In addition to paid services, the platform also offers a web panel to control malicious activities for free.
A hospital was hit by a cyberattack – but the full extent of the breach is still unknown. Walsall Healthcare NHS Trust has urged people to “remain vigilant around any suspicious activity” in the wake of the incident.
By taking immediate action when receiving an early warning, organizations can reduce potential data loss, avoid impact on operations, and reduce financial impact and other detrimental consequences.
The cyber incident began on March 17 and has led to a complete shutdown of the company’s website, billing systems, and ordering processes. During the first few days of the attack, the company remained at a standstill.