article thumbnail

Return of the MINEBRIDGE RAT With New TTPs and Social Engineering Lures

Security Boulevard

Such lures are used as social engineering schemes by threat actors; in this case, the malware was targeted at security researchers. We have recently observed other instances of threat actors targeting security researchers with social engineering techniques. Threat attribution. Currently logged in user name.

article thumbnail

ZINC Hackers Leverage Open-source Software to Lure IT Pros

eSecurity Planet

PuTTY, KiTTY, TightVNC, Sumatra PDF Reader, and the muPDF/Subliminal Recording software installer have been backdoored to perform a wide range of social engineering campaigns that started in April 2022. See the Best Open Source Security Tools. Highly Evasive Attack. Also read: How Hackers Evade Detection.

Software 126
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

North Korean threat actor APT43 pivots back to strategic cyberespionage

CSO Magazine

It was responsible for the 2014 attack against Sony Pictures, the 2016 cyber heist of funds belonging to the central bank of Bangladesh, and the 2017 WannaCry ransomware worm. When it comes to threat actors working for the North Korean government, most people have heard of the Lazarus group (APT38).

article thumbnail

Reading Mandiant M-Trends 2023

Anton on Security

Furthermore, these adversaries demonstrated a willingness to get personal with their targets, bullying and threatening many of them. ” NOT SURPRISING “Global median dwell time continued to improve year over year, with organizations detecting incidents in just over two weeks in 2022.

article thumbnail

Charming Kitten APT is targeting Iranian dissidents in Germany

Security Affairs

The Charming Kitten group made the headlines in 2014 when experts at iSight issued a report describing the most elaborate net-based spying campaign organized by Iranian hackers using social media. The cyber spies used social media to gather information on the targets and as a vector for social engineering attacks.

article thumbnail

Hackers use overlay screens on legitimate sites to steal Outlook credentials

Security Affairs

“Another social engineering technique the threat actor uses to lure the employee into interacting with the email is giving the messages urgency, asking the recipient to review them or they will be deleted after three days.” Copyright (C) 2014-2015 Media.net Advertising FZ-LLC All Rights Reserved -->.

article thumbnail

SocialEngineered forum hacked and data leaked online

Security Affairs

SocialEngineered.net is a forum dedicated to social engineering discussions, it has been compromised data of its users was leaked on a hacker forum. SocialEngineered.net, the forum dedicated to social engineering topics, announced it has suffered a data breach two weeks ago. Pierluigi Paganini.

Hacking 76