Category: Threat Intel Reports


  • [RANSOMHUB] – Ransomware Victim: www[.]tigre[.]gob[.]ar

    * [Data Breach](https://www.redpacketsecurity.com/category/databreach/)* [Ransomware](https://www.redpacketsecurity.com/category/ransomware/)-[RANSOMHUB-] — Ransomware Victim: www-[.-]tigre-[.-]gob-[.-]ar================================================================[November 1, 2024](https://www.redpacketsecurity.com/2024/11/) ![image](https://www.redpacketsecurity.com/wp-content/uploads/2024/09/image.png ‘[RANSOMHUB] – Ransomware Victim: www[.]tigre[.]gob[.]ar 1’)Ransomware Group: **RANSOMHUB**===============================### VICTIM…


  • TA Phone Home: EDR Evasion Testing Reveals Extortion Actor’s Toolkit

    ![Logo](https://unit42.paloaltonetworks.com/wp-content/uploads/2021/07/PANW_Parent.png) ![Unit42 Logo](https://unit42.paloaltonetworks.com/wp-content/themes/unit42-v6/dist/images/unit42-logo-white.svg) Menu* [Tools](https://unit42.paloaltonetworks.com/tools/)* [ATOMs](https://unit42.paloaltonetworks.com/atoms/)* [Security Consulting](https://www.paloaltonetworks.com/unit42)* [About Us](https://unit42.paloaltonetworks.com/about-unit-42/)* [**Under Attack?**](https://start.paloaltonetworks.com/contact-unit42.html) * [Threat Research Center](https://unit42.paloaltonetworks.com ‘Threat Research’)* [Threat Research](https://unit42.paloaltonetworks.com/category/threat-research/…


  • [RANSOMHUB] – Ransomware Victim: www[.]tetco-group[.]com

    * [Data Breach](https://www.redpacketsecurity.com/category/databreach/)* [Ransomware](https://www.redpacketsecurity.com/category/ransomware/)-[RANSOMHUB-] — Ransomware Victim: www-[.-]tetco-group-[.-]com===============================================================[November 1, 2024](https://www.redpacketsecurity.com/2024/11/) ![image](https://www.redpacketsecurity.com/wp-content/uploads/2024/09/image.png ‘[RANSOMHUB] – Ransomware Victim: www[.]tetco-group[.]com 1’)Ransomware Group: **RANSOMHUB**===============================### VICTIM…


  • Separating the bee from the panda: CeranaKeeper making a beeline for Thailand

    This intelligence report details a sophisticated malware campaign targeting multiple industries across various countries. The threat actor employs advanced tactics,…


  • Peoples Republic of ChinaLinked Actors Compromise Routers and IoT Devices for Botnet Operations

    PRC-linked cyber actors have compromised thousands of Internet-connected devices to create a botnet for malicious activities. Integrity Technology Group, a…


  • Hadooken and K4Spreader: The 8220 Gangs Latest Arsenal

    This analysis uncovers a significant infection chain targeting Windows and Linux systems through Oracle WebLogic vulnerabilities. The attackers, likely the…


  • Midnight Blizzard conducts largescale spearphishing campaign using RDP files

    On October 22, 2024, Microsoft identified a spear-phishing campaign in which Midnight Blizzard sent phishing emails to thousands of users…


  • Strela Stealer Targets Europe Stealthily Via WebDav

    Strela Stealer, first identified by DCSO in late 2022, is a type of information-stealing malware primarily designed to exfiltrate email…


  • Strela Stealer Targets Europe Stealthily Via WebDav

    Strela Stealer, first identified by DCSO in late 2022, is a type of information-stealing malware primarily designed to exfiltrate email…


  • Malicious CAPTCHA delivers Lumma and Amadey Trojans

    An adware campaign targets online users by presenting them with fake CAPTCHA or update prompts, tricking them into running malicious…