The scammers have borrowed the DHL company brand — even going so far as to mimic its colors, logo, and web design. Netizens have also reported receiving phishing emails from scammers posing as USPS.
Conti leaked financial information in its first dump of data in 81% of attacks, according to a Rapid7 report, whereas Cl0p only leaked it in 30%. Cl0p leaked employee personal information in 70% of its first leaks, while Conti only leaked it in 27%.
The Demonic vulnerability is tracked as CVE-2022-32969 and is caused by how web browsers save contents of non-password input fields to the disk as part of their standard “restore session” system.
On April 20, the hospitals learned that malicious code had infected their networks as a result of an unauthorized party gaining access to certain systems between ??March 31 and April 24.
The $38.5 million round is abnormally high for seed-stage funding and signals a strategic shift to make bigger bets on early-stage companies with brand-new products and no significant revenue stream.
Microsoft stated that BlackCat RaaS affiliates are targeting Microsoft Exchange Servers by exploiting unpatched bugs. The unknown threat actor delivered BlackCat ransomware payloads via PsExec. The extent of damage is still unknown, and also there wasn’t any mention of the Exchange vulnerability used for initial access.
Based on Lookout’s analysis, the spyware is likely developed by Italian spyware vendor RCS Lab S.p.A and Tykelab Srl, a telecommunications solutions company suspected to be operating as a front company.
It spreads via fake software imitating legitimate cryptocurrency or NFT wallet applications such as Gigaland NFT marketplace and Dinox (NFT-themed collectible game) to lure users.
According to the researchers’ findings, an attacker can use GhostTouch to carry out several types of malicious actions, including initiating calls and downloading malware.
A threat actor known as ‘Blue Mockingbird’ targets Telerik UI vulnerabilities to compromise servers, install Cobalt Strike beacons, and mine Monero by hijacking system resources.