article thumbnail

New S1deload Malware Hijacking Users' Social Media Accounts and Mining Cryptocurrency

The Hacker News

An active malware campaign has set its sights on Facebook and YouTube users by leveraging a new information stealer to hijack the accounts and abuse the systems' resources to mine cryptocurrency. Once infected, S1deload Stealer steals

article thumbnail

Report Finds 50% of Scattered Spider Phishing Domains Targeted Finance & Insurance

Digital Shadows

In H2 2024, 2025% of Scattered Spiders impersonating domains targeted finance and insurance sectors, while 2530% mimicked cryptocurrency platforms, representing 5055% of their activity.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Who’s Behind the GandCrab Ransomware?

Krebs on Security

But GandCrab far eclipsed the success of competing ransomware affiliate programs largely because its authors worked assiduously to update the malware so that it could evade antivirus and other security defenses. in , where the group recruited many of its distributors.

article thumbnail

Dutch police arrested the author of Dryad and Rubella Macro Builders

Security Affairs

The macro might also purposely attempt to bypass endpoint security defenses. . The police also seized around 20,000 Euro (around $22,000) in cryptocurrency such as Bitcoins. . The Rubella Macro Builder is cheap, fast and easy to use, the malware it generated can evade antivirus detection.

Malware 97
article thumbnail

VulnRecap 2/19/2024: News from Microsoft, Zoom, SolarWinds

eSecurity Planet

Akira also has potential ties to Conti, another ransomware group, through cryptocurrency transactions, according to Unit 42. Palo Alto’s Unit 42 research team said that Akira led the number of ransomware posts from new leak sites in 2023.

VPN 114
article thumbnail

Advanced threat predictions for 2025

SecureList

This is particularly notable in the case of Lazarus APT, specifically its attacks against cryptocurrency investors in May. Our latest discovery showed that Lazarus leveraged AI-generated images to promote a fake gaming site that exploited a Chrome zero-day vulnerability to steal cryptocurrency.

IoT 116
article thumbnail

ShadowRay Vulnerability: 6 Lessons for AI & Cybersecurity

eSecurity Planet

Hijacked compute: Repurposes expensive AI compute power for attackers’ needs, primarily cryptojacking, which mines for cryptocurrencies on stolen resources. Get the Free Cybersecurity Newsletter Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices.