Category: GBHackers

Hackers Abusing third-party email infrastructure to Send Spam Mails
27
Sep
2024

Hackers Abusing third-party email infrastructure to Send Spam Mails

Hackers are increasingly exploiting third-party email infrastructures to send spam emails. This tactic complicates the detection and prevention of spam…

Hacking Kia Cars Remotely with a License Plate
27
Sep
2024

Hacking Kia Cars Remotely with a License Plate

Cybersecurity researchers have uncovered a significant vulnerability in Kia vehicles that allowed hackers to remotely control key functions using nothing…

Hackers Weaponizing PDF files To Deliver New SnipBot Malware
26
Sep
2024

Hackers Weaponizing PDF files To Deliver New SnipBot Malware

The RomCom malware family, particularly its SnipBot variant, has evolved into a sophisticated threat capable of ransomware, extortion, and targeted…

Researchers Backdoored Azure Automation Account Packages And Runtime Environments
26
Sep
2024

Researchers Backdoored Azure Automation Account Packages And Runtime Environments

Runtime environments offer a flexible way to customize Automation Account Runbooks with specific packages. While base system-generated environments can’t be…

TWELVE Threat Attacks Windows To Encrypt Then Deleting Victims’ Data
26
Sep
2024

TWELVE Threat Attacks Windows To Encrypt Then Deleting Victims’ Data

The threat actor, formed in 2023, specializes in ransomware attacks targeting Russian government organizations. It encrypts and deletes victim data,…

Google Warns of North Korean IT Workers Have Infiltrated the U.S. Workforce
26
Sep
2024

Google Warns Of North Korean IT Workers Have Infiltrated The U.S. Workforce

North Korean IT workers, disguised as non-North Koreans, infiltrate various industries to generate revenue for their regime, evading sanctions and…

Beware Of Fake Verify You Are A Human Request That Delivers Malware
26
Sep
2024

Beware Of Fake Verify You Are A Human Request That Delivers Malware

Researchers observed two distinct instances where users were inadvertently led to malicious websites after conducting Google searches for video streaming…

Octo2 Android Malware Attacking To Steal Banking Credentials
26
Sep
2024

Octo2 Android Malware Attacking To Steal Banking Credentials

The original threat actor behind the Octo malware family has released a new variant, Octo2, with enhanced stability for remote…

RansomHub Ransomware Using Multiple Techniques To Disable EDR And Antivirus
26
Sep
2024

RansomHub Ransomware Using Multiple Techniques To Disable EDR And Antivirus

The RansomHub ransomware group tracked as Water Bakunawa, employs targeted spear-phishing to exploit the Zerologon vulnerability, allowing them to gain…

New Mallox Ransomware Linux Variant Attacking Enterprise Linux Servers
26
Sep
2024

New Mallox Ransomware Linux Variant Attacking Enterprise Linux Servers

Kryptina RaaS, a free and open-source RaaS platform for Linux, initially struggled to attract attention. Still, after a Mallox affiliate’s…

TeamTNT Hackers Attacking VPS Servers Running CentOS
26
Sep
2024

TeamTNT Hackers Attacking VPS Servers Running CentOS

TeamTNT is targeting CentOS VPS clouds with SSH brute force attacks. It has uploaded a malicious script that disables security,…

Russian Hackers Registering Domains Targeting US Tech Brands
26
Sep
2024

Russian Hackers Registering Domains Targeting US Tech Brands

Researchers are tracking a Russian threat actor deploying domains involved in crypto scams targeting the US Presidential Election and tech…