Rapid7

Malware Campaign Lures Users With Fake W2 Form

A malicious campaign targeting users searching for W2 forms began on June 21, 2024, with a JavaScript file dropping a Brute Ratel Badger DLL into the user's AppData. This initiated the installation of a Latrodectus backdoor.

Authentication Bypasses in MOVEit Transfer and MOVEit Gateway

A critical security vulnerability, CVE-2024-5806, has been found in MOVEit Transfer, a popular file transfer software. The vulnerability allows attackers to bypass authentication checks and gain administrative access by sending manipulated requests.

Malvertising Campaign Leads to Execution of Oyster Backdoor

Oyster is a backdoor that collects host information, communicates with C2 addresses, and allows remote code execution. It was first discovered in September 2023 by IBM researchers and gained the nickname "CleanUpLoader" in February.

Ongoing Malvertising Campaign leads to Ransomware

Cybercriminals have weaponized popular software tools like WinSCP and PuTTY to deliver ransomware, tricking users into downloading malicious installers that infect their systems with a Sliver beacon and other malicious payloads.

Ongoing Social Engineering Campaign Linked to Black Basta Ransomware Operators

The threat actors then call the impacted users, posing as members of the organization's IT team, and attempt to socially engineer the users into providing remote access to their computers through the use of legitimate RMM solutions.
March 25, 2024

Updated APT Playbook of North Korean Kimsuky Threat Group

The North Korea-linked threat actor known as Kimsuky (aka Black Banshee, Emerald Sleet, or Springtail) has been observed shifting its tactics, leveraging Compiled HTML Help (CHM) files as vectors to deliver malware for harvesting sensitive data.

Multiple Vulnerabilities in South River Technologies' Titan MFT and Titan SFTP Servers Fixed

These include authenticated remote code execution via "zip slip" and WebDAV path traversal, session fixation on the remote administration server, information disclosure via path traversal on FTP, and information disclosure in the admin interface.

Driver-Based Attacks: Past and Present

In the attack technique called Bring Your Own Vulnerable Driver (BYOVD), an adversary with administrative privileges installs a legitimately signed driver with a vulnerability on the victim system.

2020 InfoSec Naughty List: Cyberattacks by Country

The list, by Rapid7, is focused on the top offenders for the last half of the year and provides a smoothed trending view (vs. discrete daily counts) to help you make your Naughty/Nice inclusion decisions.

Defend Against Threats with Cyber Fusion

Cyware is the leading provider of cyber fusion solutions that power threat intelligence sharing , end-to-end automation and 360-degree threat response.

Trending Tags