article thumbnail

TeamTNT cybercrime gang expands its arsenal to target thousands of orgs worldwide

Security Affairs

The activity of the TeamTNT group has been detailed by security firm Trend Micro, but in August 2020 experts from Cado Security discovered that that botnet is also able to target misconfigured Kubernetes installations. “AT&T Alien Labs has discovered new malicious files distributed by the threat actor TeamTNT. .

article thumbnail

Sysadmin of fake cybersecurity company sentenced to jail after billion-dollar crime spree

Hot for Security

Notorious FIN7 gang stole payment card details from retailers around the world Cybercrime gang posed as penetration testing firm to recruit hackers. FIN7 operated a front company called Combi Security, which claimed to offer penetration testing services.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Exposing the "Data Leaks" Paradise – An Analysis

Security Boulevard

biased exclusivity and double layer monetization combination where the attacker might only sell the database to its actual owner and actually get rid of it once they receive the payment.

article thumbnail

TA505 Cybercrime targets system integrator companies

Security Affairs

The analysis of a malicious email revealed a possible raising interest of the TA505 cybercrime gang in system integrator companies. The infrastructure used in the attacks suggests the involvement of the cybercrime group TA505. I am a computer security scientist with an intensive hacking background. Introduction.

article thumbnail

Malware exploits undocumented Google OAuth endpoint to regenerate Google cookies

Security Affairs

hw/iPhone9_4 (gzip)) suggests that a penetration test on Google Drive’s services on Apple devices was a potential origin for the exploit. The exploit’s imperfect testing led to revealing its source.” iPhone/15.7.4 ” concludes the report.

Malware 129
article thumbnail

CISA MAR report provides technical details of FiveHands Ransomware

Security Affairs

Cybersecurity and Infrastructure Security Agency (CISA) has published an analysis of the FiveHands ransomware that was recently detailed by FireEye’s Mandiant. The Malware Analysis Report (MAR) published by Cybersecurity and Infrastructure Security Agency (CISA) includes detailed analysis of 18 malicious files submitted to CISA.

article thumbnail

Google provides rules to detect tens of cracked versions of Cobalt Strike

Security Affairs

Cobalt Strike is a paid penetration testing product that allows an attacker to deploy an agent named ‘Beacon’ on the victim machine. Researchers at Google Cloud identified 34 different hacked release versions of the Cobalt Strike tool in the wild.