Karakurt extortion group: Threat profile

Credit to Author: Jovi Umawing| Date: Tue, 14 Jun 2022 16:00:29 +0000

An obscure group called Karakurt has extorted organizations in the US and elsewhere. Know how to keep it away from your network.

The post Karakurt extortion group: Threat profile appeared first on Malwarebytes Labs.

Read more

Miners snatching open source tools to strengthen their malevolent power!

Credit to Author: Anant Pulgam| Date: Fri, 26 Apr 2019 07:02:51 +0000

From the last one year, Quick Heal Security Labs has been observing a boost in the number of mining malware. One of the ways to earn cryptocurrencies is to mine them. Nowadays cryptocurrency miner malware have become hot attack vectors for cybercriminals due to its ease of deployment and instant…

Read more

The Advanced Persistent Threat Files: APT1

Credit to Author: William Tsing| Date: Fri, 22 Feb 2019 17:59:13 +0000

Next up in the Advanced Persistent Threat Files: APT1, a unit of the People’s Liberation Army of China known for wide-scale and high-volume data collection on mostly English-speaking companies.

Categories:

Tags:

(Read more…)

The post The Advanced Persistent Threat Files: APT1 appeared first on Malwarebytes Labs.

Read more

Sophisticated Ransomware : “Katyusha”

Credit to Author: Ghanshyam More| Date: Fri, 14 Dec 2018 10:59:58 +0000

For several months, Quick Heal Security Labs has been observing an increase in ransomware, we have found one more interesting ransomware which encrypts files and adds extension “.katyusha” and demands for an amount of 0.5 btc within three days and threatens to release the data to public download if the ransom is not…

Read more

Windows Defender ATP thwarts Operation WilySupply software supply chain cyberattack

Credit to Author: msft-mmpc| Date: Thu, 04 May 2017 16:29:18 +0000

Several weeks ago, the Windows Defender Advanced Threat Protection (Windows Defender ATP) research team noticed security alerts that demonstrated an intriguing attack pattern. These early alerts uncovered a well-planned, finely orchestrated cyberattack that targeted several high-profile technology and financial organizations. An unknown attacker was taking advantage of a silent yet effective attack vector: the compromised…

Read more