article thumbnail

Crooks target Ukraine’s IT Army with a tainted DDoS tool

Security Affairs

Cisco Talos researchers have uncovered a malware campaign targeting Ukraine’s IT Army , threat actors are using infostealer malware mimicking a DDoS tool called the “Liberator.” Liberator is advertised as a DDoS tool to launch attacks against “Russian propaganda websites.” 35) on port 6666. Pierluigi Paganini.

DDOS 85
article thumbnail

Interview With a Crypto Scam Investment Spammer

Krebs on Security

Social networks are constantly battling inauthentic bot accounts that send direct messages to users promoting scam cryptocurrency investment platforms. The messages said recipients had earned an investment credit at a cryptocurrency trading platform called moonxtrade[.]com. “On Twitter, more spam and crypto scam.”

Scams 243
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Consumer cyberthreats: predictions for 2024

SecureList

There are two main reasons for that: political pressure and DDoS attacks. In the other case, organizations use geofencing to protect their resources from DDoS attacks. Cognizant of these measures, individuals may perceive a potential impact on their data privacy and thus turn to robust privacy solutions like VPN.

VPN 89
article thumbnail

Cyberthreats to financial organizations in 2022

SecureList

We should expect more fraud, targeting mostly BTC , because this cryptocurrency is the most popular. In fact, from January through the end of October, Kaspersky detected more than 2,300 fraudulent global resources aimed at 85,000 potential crypto investors or users who are interested in cryptocurrency mining.

article thumbnail

Security Affairs newsletter Round 313

Security Affairs

Cloud hosting provider Swiss Cloud suffered a ransomware attack Hacking a Tesla Model X with a DJI Mavic 2 drone equipped with a WIFI dongle WeSteal, a shameless commodity cryptocurrency stealer available for sale Experian API exposed credit scores of tens of millions of Americans Expert released PoC exploit for Microsoft Exchange flaw Most Common (..)

article thumbnail

Security Affairs newsletter Round 294

Security Affairs

A massive fraud operation used mobile device emulators to steal millions from online bank accounts SolarWinds hackers also breached the US NNSA nuclear agency Clop ransomware gang paralyzed flavor and fragrance producer Symrise Dell Wyse ThinOS flaws allow hacking think clients SUPERNOVA, a backdoor found while investigating SolarWinds hack Zero-day (..)

Hacking 73
article thumbnail

Discover 2022’s Nastiest Malware

Webroot

Since the mainstreaming of ransomware payloads and the adoption of cryptocurrencies that facilitate untraceable payments, malicious actors have been innovating new methods and tactics to evade the latest defenses. In other words, 2022 has been an eventful year in the threat landscape, with malware continuing to take center stage.

Malware 61