Remove Cryptocurrency Remove DDOS Remove Malware Remove VPN
article thumbnail

Crooks target Ukraine’s IT Army with a tainted DDoS tool

Security Affairs

Threat actors are spreading password-stealing malware disguised as a security tool to target Ukraine’s IT Army. Cisco Talos researchers have uncovered a malware campaign targeting Ukraine’s IT Army , threat actors are using infostealer malware mimicking a DDoS tool called the “Liberator.” 35) on port 6666.

DDOS 84
article thumbnail

Discover 2022’s Nastiest Malware

Webroot

In other words, 2022 has been an eventful year in the threat landscape, with malware continuing to take center stage. The 6 Nastiest Malware of 2022. With that, here are the 6 Nastiest Malware of 2022. The post Discover 2022’s Nastiest Malware appeared first on Webroot Blog. 2022 was no different.

Malware 61
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Interview With a Crypto Scam Investment Spammer

Krebs on Security

Social networks are constantly battling inauthentic bot accounts that send direct messages to users promoting scam cryptocurrency investment platforms. The messages said recipients had earned an investment credit at a cryptocurrency trading platform called moonxtrade[.]com. “Consider salaries in Russia,” Quotpw said.

Scams 243
article thumbnail

Cyberthreats to financial organizations in 2022

SecureList

We should expect more fraud, targeting mostly BTC , because this cryptocurrency is the most popular. Currently, at a value of approximately $60,000, cybercriminals have adapted their malware to monitor the operating system’s clipboard and redirect funds to addresses under their control. MageCart attacks moving to the server side.

article thumbnail

Consumer cyberthreats: predictions for 2024

SecureList

As anticipated, they capitalized on major events and cultural crazes, using tricks that ranged from fake Barbie doll deals to exploiting the buzz around long-awaited video game releases, for example, by disguising malware as a cracked Hogwarts Legacy version , a classic move we have seen for years.

VPN 90
article thumbnail

Security Affairs newsletter Round 283

Security Affairs

fitness chains Town Sports leaked online Group-IB detects a series of ransomware attacks by OldGremlin HOW DO PROVIDERS IMPLEMENT INTERNET BLOCKING IN BELARUS? Copyright (C) 2014-2015 Media.net Advertising FZ-LLC All Rights Reserved -->. Copyright (C) 2014 Media.net Advertising FZ-LLC All Rights Reserved -->.

IoT 102
article thumbnail

Security Affairs newsletter Round 313

Security Affairs

Experts found critical authentication bypass flaw in HPE Edgeline Infrastructure Manager UNC2529, a new sophisticated cybercrime gang that targets U.S.