Cybercriminals Using Telegram messaging service to Distribute ToxicEye Malware
Cybercriminals Using Telegram messaging service to Distribute ToxicEye Malware
  • Alert & Advisory
  • April 28, 2021

Researchers discovered that Telegram instant messaging service is being used by malicious actors to manage a remote access trojan (RAT) called ToxicEye. These cyber criminals are increasingly abusing Telegram as a "command-and-control" system to distribute malware into organizations that could then be used to capture sensitive information from targeted systems. More than 130 attacks involving the ToxicEye RAT has been discovered recently, and warning that even when Telegram is not installed or being used, the system allows hackers to send malicious commands and operations remotely via the instant messaging app.

Cellebrite Forensic Software Security Vulnerabilities
Cellebrite Forensic Software Security Vulnerabilities
  • Alert & Advisory
  • April 28, 2021

Signal CEO in a successful hacking of the Cellebrite cellphone hacking and cracking tool revealed that the software lacks industry-standard exploit mitigation defenses, thereby making the software vulnerable to exploitations. This is coming after Cellebrite claimed in 2019 that its new tool unlocks almost any iOS and Android device, and in December 2020, that it could easily crack Signal’s encryption. Marlinspike accused Cellebrite of making a living from undisclosed vulnerabilities hence the decision to play it smart with the company by publicly publishing the vulnerability.

Fake LinkedIn Job Offer Malware
Fake LinkedIn Job Offer Malware
  • Alert & Advisory
  • April 12, 2021

A new spear-phishing campaign has been discovered to be targeting professionals on LinkedIn with weaponized job offers in an attempt to infect targets with a sophisticated and dangerous backdoor trojan called "more_eggs." According to researchers, the threat actors are using zip files to trick LinkedIn users into executing the More_eggs backdoor.

Phishing Attack Using Fake Google reCAPTCHA to Steal Credential from Microsoft Users
Phishing Attack Using Fake Google reCAPTCHA to Steal Credential from Microsoft Users
  • Alert & Advisory
  • March 16, 2021

A Microsoft-themed phishing campaign is using phony Google reCAPTCHA in an attempt to steal credentials from senior employees of various organizations. At least 2,500 such emails have been sent to senior-level employees, over the past three months. The emails first take recipients to a fake Google reCAPTCHA system page. Once victims “pass” the reCAPTCHA test, they are then redirected to a phishing landing page, which asks for their Office 365 credentials. After filling out the fake reCAPTCHA system, victims are then directed to what appears to be a Microsoft login screen.

Microsoft Exchange Servers Zero-Day Vulnerability
Microsoft Exchange Servers Zero-Day Vulnerability
  • Alert & Advisory
  • March 8, 2021

Microsoft has confirmed the attacks against the Exchange servers aimed at stealing email addresses and installing malware to gain persistence in the target networks. This attacks campaign has been attributed to China-based hacker group called HAFNIUM who were exploiting unknown software bugs in Exchange Server to steal sensitive data from select targets. The vulnerability is being actively exploited in the wild by several cyber espionage groups, including LuckyMouse, Tick, and Calypso targeting servers around the world.

Related Articles