Cybercriminals Abusing Internet-Sharing Services to Monetize Malware Campaigns – Tempemail

Threat actors are capitalizing on the growing popularity of proxyware platforms like Honeygain and Nanowire to monetize their own malware campaigns, once again illustrating how attackers are quick to repurpose and weaponize legitimate platforms to their advantage. “Malware is currently leveraging these platforms to monetize the internet bandwidth of victims, Continue Reading

16 Cybercriminals Behind Mekotio and Grandoreiro Banking Trojan Arrested in Spain – Tempemail

Spanish law enforcement agencies on Wednesday arrested 16 individuals belonging to a criminal network in connection with operating two banking trojans as part of a social engineering campaign targeting financial institutions in Europe. The arrests were made in Ribeira (A Coruña), Madrid, Parla and Móstoles (Madrid), Seseña (Toledo), Villafranca de Continue Reading

Do cybercriminals play cyber games in quarantine? A look one year later- Tempemail

Last year, we decided to take a look at how the pandemic influenced the gaming industry and what new threats gamers could be facing. What we found was that, with the transition to remote work and remote learning, the number of blocked attempts to visit malicious game-related websites or follow Continue Reading

Authorities Seize DoubleVPN Service Used by Cybercriminals – Tempemail

A coordinated international law enforcement operation resulted in the takedown of a VPN service called DoubleVPN for providing a safe haven for cybercriminals to cover their tracks. “On 29th of June 2021, law enforcement took down DoubleVPN,” the agencies said in a seizure notice splashed on the now-defunct site. “Law Continue Reading

Cybercriminals Hold $115,000-Prize Contest to Find New Cryptocurrency Hacks – Tempemail

A top Russian-language underground forum has been running a “contest” for the past month, calling on its community to submit “unorthodox” ways to conduct cryptocurrency attacks. The forum’s administrator, in an announcement made on April 20, 2021, invited members to submit papers that assess the possibility of targeting cryptocurrency-related technology, Continue Reading

Colonial Pipeline Paid Nearly $5 Million in Ransom to Cybercriminals – Tempemail

Colonial Pipeline on Thursday restored operations to its entire pipeline system nearly a week following a ransomware infection targeting its IT systems, forcing it to reportedly shell out nearly $5 million to restore control of its computer networks. “Following this restart, it will take several days for the product delivery Continue Reading

Cybercriminals Widely Abusing Excel 4.0 Macro to Distribute Malware – Tempemail

Threat actors are increasingly adopting Excel 4.0 documents as an initial stage vector to distribute malware such as ZLoader and Quakbot, according to new research. The findings come from an analysis of 160,000 Excel 4.0 documents between November 2020 and March 2021, out of which more than 90% were classified Continue Reading

Cybercriminals Using Telegram Messenger to Control ToxicEye Malware – Tempemail

Adversaries are increasingly abusing Telegram as a “command-and-control” system to distribute malware into organizations that could then be used to capture sensitive information from targeted systems. “Even when Telegram is not installed or being used, the system allows hackers to send malicious commands and operations remotely via the instant messaging Continue Reading

YIKES! Cybercriminals flood the Internet with 100,00 malicious PDF documents – Tempemail

Cybercriminals are resorting to search engine poisoning techniques to lure business professionals into seemingly legitimate Google sites that install a Remote Access Trojan (RAT) capable of carrying out a wide range of attacks. The attack works by leveraging searches for business forms such as invoices, templates, questionnaires, and receipts as Continue Reading

Cybercriminals Now Using Plex Media Servers to Amplify DDoS Attacks – Tempemail

A new distributed denial-of-service attack (DDoS) vector has ensnared Plex Media Server systems to amplify malicious traffic against targets to take them offline. “Plex’s startup processes unintentionally expose a Plex UPnP-enabled service registration responder to the general Internet, where it can be abused to generate reflection/amplification DDoS attacks,” Netscout researchers Continue Reading