article thumbnail

Malicious Minecraft mods distributed by the Stargazers DaaS target Minecraft gamers

Security Affairs

However, this openness has also made it a target for cyber threats. Threat actors employ a multi-stage infection chain, with the first two stages written in Java and requiring the Minecraft runtime to execute, making the threat highly targeted at the game’s user base. ” reads the report published by Check Point.

article thumbnail

Silent Ransom Group targeting law firms, the FBI warns

Security Affairs

“The cyber threat actor Silent Ransom Group (SRG), also known as Luna Moth, Chatty Spider, and UNC3753, is targeting law firms using information technology (IT) themed social engineering calls, and callback phishing emails, to gain remote access to systems or devices and steal sensitive data to extort the victims.”

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Black Friday Triggers Near 700% Rise in Retail Cyber Scams

SecureWorld News

The United States retail sector faced an especially aggressive wave of cyber threats, with phishing attacks mimicking major holiday brands [3] including Walmart, Target, and Best Buy increasing by more than 2,000% during peak shopping periods. Here are five tips to help businesses protect themselves and their customers.

article thumbnail

Report Shows Ransomware Has Grown 41% for Construction Industry

Digital Shadows

Conclusion The construction sector’s susceptibility to cyber threats and its critical need to maintain operational continuity makes it a prime target for malicious actors.

article thumbnail

Coyote Banking Trojan targets Brazilian users, stealing data from 70+ financial apps and websites

Security Affairs

” The decrypted MSIL file maintains persistence by modifying the Windows registry to execute a PowerShell command that downloads the Coyote Banking Trojan. “Consequently, it highlights the critical need for robust security measures for both individuals and institutions to safeguard against evolving cyber threats.”

article thumbnail

Russia-linked group Nebulous Mantis targets NATO-related defense organizations

Security Affairs

” Nebulous Mantis imitates trusted services like OneDrive to trick victims into downloading infected files, often hosted on Mediafire. Post-infection, a fake PDF triggers an EXE that checks for sandbox evasion markers before downloading further payloads like Keyprov.dll. The APT group uses RomCom malware in multi-stage attacks.

article thumbnail

CERT-UA reports attacks in March 2025 targeting Ukrainian agencies with WRECKSTEEL Malware

Security Affairs

. “The Ukrainian government’s computer emergency response team, CERT-UA, is taking systematic measures to accumulate and analyze data on cyber incidents in order to provide up-to-date information on cyber threats.” ” Since fall 2024, threat actor used compromised accounts to send emails with links (e.g.,