Category: Threat Intel Reports
-
[LYNX] – Ransomware Victim: Jim Thompson
* [Data Breach](https://www.redpacketsecurity.com/category/databreach/)* [Ransomware](https://www.redpacketsecurity.com/category/ransomware/)-[LYNX-] — Ransomware Victim: Jim Thompson===========================================[January 11, 2025](https://www.redpacketsecurity.com/2025/01/) ![image](https://www.redpacketsecurity.com/wp-content/uploads/2024/09/image.png ‘[LYNX] – Ransomware Victim: Jim Thompson 1’)Ransomware Group:…
-
[LYNX] – Ransomware Victim: Astaphans
* [Data Breach](https://www.redpacketsecurity.com/category/databreach/)* [Ransomware](https://www.redpacketsecurity.com/category/ransomware/)-[LYNX-] — Ransomware Victim: Astaphans========================================[January 11, 2025](https://www.redpacketsecurity.com/2025/01/) ![image](https://www.redpacketsecurity.com/wp-content/uploads/2024/09/image.png ‘[LYNX] – Ransomware Victim: Astaphans 1’)Ransomware Group: **LYNX**==========================### VICTIM…
-
[FUNKSEC] – Ransomware Victim: new cloud storage for our leaks
* [Data Breach](https://www.redpacketsecurity.com/category/databreach/)* [Ransomware](https://www.redpacketsecurity.com/category/ransomware/)-[FUNKSEC-] — Ransomware Victim: new cloud storage for our leaks=================================================================[January 11, 2025](https://www.redpacketsecurity.com/2025/01/) ![image](https://www.redpacketsecurity.com/wp-content/uploads/2024/09/image.png ‘[FUNKSEC] – Ransomware Victim:…
-
IBM watsonx.ai Vulnerability Let Attackers Embed Arbitrary JavaScript Code in Web UI
IBM disclosed a significant vulnerability in its watsonx.ai platform, potentially exposing users to [cross-site scripting (XSS)](https://cybersecuritynews.com/xss-remains-as-the-most-vulnerability/) attacks. The vulnerability, identified…
-
DoJ charged three Russian citizens with operating crypto-mixing services
The U.S. Department of Justice charged three Russian citizens with operating crypto-mixing services that helped crooks launder cryptocurrency.———————————————————————————————————————————————-The U.S. Department…
-
Information Stealer Masquerades as LDAPNightmare (CVE202449113) PoC Exploit
A fake proof-of-concept exploit for the LDAPNightmare vulnerability (CVE-2024-49113) is being used to distribute information-stealing malware. The malicious repository, disguised…
-
Black Basta Ransomware Campaign Drops Zbot, DarkGate, and Custom Malware
A resurgence of activity related to the Black Basta ransomware campaign has been observed since early October. The threat actors…
-
Recruitment Phishing Scam Imitates Hiring Process
A sophisticated phishing campaign has been discovered that exploits recruitment branding to deliver malware. The attack begins with a phishing…
-
Increase in Distribution of AutoIt Compile Malware via Phishing Emails
The distribution of malware compiled with AutoIt has been rapidly increasing, surpassing .NET-type malware. AutoIt, a scripting language for Windows…
-
Stealthy Credit Card Skimmer Targets WordPress Checkout Pages via Database Injection
A sophisticated credit card skimmer malware has been discovered targeting WordPress websites. The malware injects malicious JavaScript into database entries,…