September 24, 2024

Global infostealer malware operation targets crypto users, gamers

A large-scale information-stealing malware operation, comprising thirty distinct campaigns and targeting a wide range of user demographics and system platforms, has been identified and attributed to a cybercriminal group known as “Marko Polo.”The threat actors employ multiple distribution methods, including malicious advertising (malvertising), spearphishing, and brand impersonation within the online gaming, cryptocurrency, and software sectors, to disseminate fifty malware variants, […]
September 20, 2024

New Linux malware Hadooken targets Oracle WebLogic servers

Aqua Security’s Nautilus research team recently reported the emergence of a new Linux malware called Hadooken. This malware specifically targets Oracle WebLogic servers to deploy additional malicious software and extract credentials for lateral movement within compromised networks.The Hadooken malware is disseminated through attacks that exploit vulnerabilities associated with weak passwords to gain initial access. Once attackers infiltrate a WebLogic server, […]
September 9, 2024

Server Attacked, Risk of Information Leak | System Square

On September 9, 2024, System Square disclosed that it had been the target of a cyberattack on August 26, 2024. The attack was confirmed to have damaged several of the company’s servers. The compromised servers contained customer and technical information, which may have been exposed due to the incident.The legitimate project, however, has clarified that there is no connection between […]
September 1, 2024

Linux version of new Cicada ransomware targets VMware ESXi servers

A new ransomware-as-a-service (RaaS) operation is falsely associating itself with the legitimate Cicada 3301 organization and has already listed 19 victims on its extortion portal, targeting companies globally at an alarming pace.This cybercrime operation adopts both the name and logo of the enigmatic 2012-2014 Cicada 3301 online and real-world game, which was known for its complex cryptographic puzzles.However, there is […]