Remove Cryptocurrency Remove Data collection Remove Energy and Utilities
article thumbnail

IT threat evolution Q3 2024

SecureList

CloudSorcerer is a sophisticated cyber-espionage tool used for stealth monitoring, data collection and exfiltration via Microsoft, Yandex and Dropbox cloud infrastructures. The malware utilizes cloud resources for its C2 (command and control) servers, which it accesses via APIs using authentication tokens.

article thumbnail

Advanced threat predictions for 2024

SecureList

APT targeting turns toward satellite technologies, producers and operators The only known case of an attack utilizing satellite technologies that happened in recent years was the KA-SAT network hack of 2022. The next WannaCry Fortunately for us, a new cyber epidemic did not happen. Verdict: prediction not fulfilled ❌ 4.

Hacking 140
article thumbnail

Spam and phishing in 2022

SecureList

These sites referenced public figures and humanitarian groups, offering to accept cash in cryptocurrency, something that should have raised a red flag in itself. By getting the user’s secret phrase, cybercriminals could get access to their cryptocurrency balance. Payout notices could arrive by mail, email, or as a text message.

Phishing 116