US sanctions Russian cyber broker Operation Zero for trafficking stolen US government exploits
Sanctions also target two Trickbot members who allegedly helped Operation Zero and their own exploit brokerage firm.
Sanctions also target two Trickbot members who allegedly helped Operation Zero and their own exploit brokerage firm.
Analysis of domain registration data indicates that the threat actors are using a rotating set of domains and cloud hosting services to deliver malware.
This marks the first time the Medusa ransomware has been linked to North Korean threat actors.
The observed campaign deploys a five-stage infection chain installing a native C implant designed for persistence and lateral movement.
The attack begins with social engineering lures promoting free premium software, including pirated office productivity suite installers.
Oleksandr Didenko stole the identities of US citizens and sold them to overseas IT workers through the UpWorkSell online platform.
CISA has flagged the BeyondTrust vulnerability as actively exploited in ransomware attacks.
The attack resembles earlier “Shai-Hulud” waves, embedding malicious code into npm packages.
The documentation found by the team mentions multiple CVEs across various targets, but it appears that the attackers largely failed while attempting to exploit weaknesses.
In brief: Chinese hackers exploit a zero-day flaw in Dell software, Google has patched the first Chrome zero-day of the year, and more.
Showing elements 101 - 110