Credit to Author: Tilly Travers| Date: Tue, 15 Feb 2022 13:00:59 +0000
While Squirrelwaffle leveraged Exchange to spread malspam through hijacked email threads, one thread was spirited away by attackers to trick the target into a money transfer
Credit to Author: Tilly Travers| Date: Tue, 15 Feb 2022 13:00:10 +0000
Squirrelwaffle is a malicious dropper or loader used to deliver other malware onto target systems. This guide shows Security Operations Centers (SOCs) and Incident Response Teams how to detect and respond to the presence of Squirrelwaffle on the network
Credit to Author: Zhengyu Dong| Date: Tue, 15 Feb 2022 00:00:00 +0000
Certain SMS PVA services allow their customers to create disposable user profiles or register multiple accounts on many popular online platforms. These services can be abused by criminals to conduct fraud or other malicious activities.
FortiGuard Labs researchers discovered an Excel file that uses NFT related information as a lure to download and install BitRAT malware. Read our blog to learn how the attack works.
Credit to Author: BrianKrebs| Date: Mon, 14 Feb 2022 18:22:38 +0000
In January, KrebsOnSecurity examined clues left behind by “Wazawaka,” the hacker handle chosen by a major ransomware criminal in the Russian-speaking cybercrime scene. Wazawaka has since “lost his mind” according to his erstwhile colleagues, creating a Twitter account to drop exploit code for a widely-used virtual private networking (VPN) appliance, and publishing bizarre selfie videos taunting security researchers and journalists. In last month’s story, we explored clues that led from Wazawaka’s multitude of monikers, email addresses, and passwords to a 30-something father in Abakan, Russia named Mikhail Pavlovich Matveev. This post concerns itself with the other half of Wazawaka’s identities not mentioned in the first story, such as how Wazawaka also ran the Babuk ransomware affiliate program, and later became “Orange,” the founder of the ransomware-focused Dark Web forum known as “RAMP.”