Remove Cryptocurrency Remove Engineering Remove Phishing Remove Spyware
article thumbnail

Spam and phishing in 2022

SecureList

Short-lived phishing sites often offered to see the premieres before the eagerly awaited movie or television show was scheduled to hit the screen. These sites referenced public figures and humanitarian groups, offering to accept cash in cryptocurrency, something that should have raised a red flag in itself.

Phishing 102
article thumbnail

Security Affairs newsletter Round 422 by Pierluigi Paganini – International edition

Security Affairs

Xplain hack impacted the Swiss cantonal police and Fedpol Zyxel published guidance for protecting devices from ongoing attacks Kimsuky APT poses as journalists and broadcast writers in its attacks New Linux Ransomware BlackSuit is similar to Royal ransomware CISA adds Progress MOVEit Transfer zero-day to its Known Exploited Vulnerabilities catalog (..)

Spyware 88
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Crimeware and financial cyberthreats in 2023

SecureList

Cryptocurrency targeted attacks. The cryptocurrency business continues to grow, and people continue to invest their money in this market because it’s a digital asset and all transactions occur online. More cryptocurrency-related threats: fake hardware wallets, smart contract attacks, DeFi hacks, and more.

article thumbnail

Security Affairs newsletter Round 178 – News of the week

Security Affairs

. · Expert publicly disclosed exploit code for Windows Task Scheduler Zero-Day. · Iran-linked COBALT DICKENS group targets universities in new phishing campaign. · Security firm attributes Cosmos Bank cyberheist to Lazarus APT. · Cryptocurrency Platform Atlas Quantum hacked, 260k users impacted. · CVE-2018-15919 username enumeration (..)

Spyware 41
article thumbnail

IT threat evolution in Q2 2023

SecureList

While investigating an infection of a cryptocurrency company in Southeast Asia, we found Gopuram coexisting on target computers with AppleJeus , a backdoor attributed to the Lazarus. The threat actor specifically targeted cryptocurrency companies. We observed that they have a specific interest in cryptocurrency companies.

Malware 80
article thumbnail

Types of Malware & Best Malware Protection Practices

eSecurity Planet

Attackers often use botnets to send out spam or phishing campaigns to carry out distributed denial of service (DDoS) attacks. Additional features of botnets include spam, ad and click fraud, and spyware. Phishing and Social Engineering. More targeted efforts at specific users or organizations are known as spear phishing.

Malware 105
article thumbnail

IT threat evolution Q1 2022

SecureList

In January, we reported a malicious campaign targeting companies that work with cryptocurrencies, smart contracts, decentralized finance and blockchain technology: the attackers are interested in fintech in general. The campaign has two goals: gathering information and stealing cryptocurrency. Other malware.

Phishing 118