Critical bug in ProjectSend file-sharing software exploited in the wild
Users are strongly advised to update their systems as soon as possible to prevent the exploitation of the flaw.
Users are strongly advised to update their systems as soon as possible to prevent the exploitation of the flaw.
The threat actor leveraged well-known legitimate services such as Google Drive, Bitbucket, and StatCounter to hide its malicious activities.
CyberVolk recently claimed responsibility for attacks on critical infrastructure and scientific institutions in Japan, France, and the UK.
The operation identified more than 35,000 victims and financial losses exceeding $193 million worldwide.
The bootkit has not yet been observed in real-world attacks.
Three malicious versions of the package were discovered designed to steal crypto wallet assets.
The vulnerability has been exploited by a threat actor group known as Earth Kasha.
Earth Estries employs a complex command-and-control (C&C) infrastructure operated by distinct teams.
The attack chain begins with a fake website designed to redirect users to an exploit server.
The malware uses a vulnerable driver to gain kernel-level access to the operating system.
Showing elements 921 - 930