Legion Stealer targeting PUBG players

Legion Tool Steals PUBG Players’ Sensitive Data through a Fake GitHub Repo

Scammers are using a misleading GitHub page to distribute Legion Stealer to fans of rogue PUBG games. Under the guise of cheats, users download malware. Legion Stealer Attacks PUBG Players Cyble Research and Intelligence Labs (CRIL) recently uncovered a fraudulent GitHub page pretending to be a PUBG bypass hack project. However, instead of providing game… Continue reading Legion Stealer targeting PUBG players

Bed Bath & Beyond Shopping Scams

Cybercriminals use the sell-off of a bankrupted retailer to scam people

In late April, 2023, American home goods retailer Bed Bath & Beyond filed for bankruptcy protection under Chapter 11. This event was expected, due to the company’s poor performance over the last quarter before the bankruptcy. Though, not only short sellers decided to make profit on this: online scammers decided to fool people, appealing to… Continue reading Bed Bath & Beyond Shopping Scams

Barts NHS Trust Hacked by BlackCat/ALPHV Ransomware Group

Russian cybercrime group continues to terrorize the healthcare sector.

A Russian cybercriminal gang BlackCat claims to have hacked into one of Britain’s most prominent hospital groups and threatens to release much of its sensitive data. Barts NHS Trust Attacked by ALPHV/BlackCat On June 30, Russian extortionist group BlackCat, aka ALPHV, claimed to have hacked into Barts Health NHS Trust, one of England’s most prominent… Continue reading Barts NHS Trust Hacked by BlackCat/ALPHV Ransomware Group

Proxyjacking: The Latest Cybercriminal Invention In Action

Attackers hack into devices and turn them into proxy servers to make a profit

Today, in the constantly changing world of cyber threats, attackers always look for new ways to get more benefits with less effort. Recently, researchers found an example of this and called it proxyjacking for profit. What is proxyjacking? Proxyjacking is an attacker’s illegal use of a victim’s bandwidth for its own good. The closest related… Continue reading Proxyjacking: The Latest Cybercriminal Invention In Action

PlugX malware attacks European diplomats

European diplomats are being targeted by a new type of malware called PlugX.

Over the past few months, researchers have been monitoring the activity of a Chinese threat actor using PlugX malware to target foreign and domestic policy entities and embassies in Europe. This is a more significant trend among Chinese-based groups increasingly focusing on European entities, particularly their foreign policy. The countries most targeted in this campaign… Continue reading PlugX malware attacks European diplomats

Akira Ransomware Decryptor Is Available To The Public

If you are a victim of Akira Ransomware, we have good news for you.

Cybersecurity experts have released a decryptor for the Akira ransomware. It will allow victims who encounter attacks to decrypt their files without paying a ransom. Akira ransomware decryptor released to the public Cybersecurity firm Avast recently released a free decryptor for Akira ransomware. This tool can help victims recover their data without paying any money… Continue reading Akira Ransomware Decryptor Is Available To The Public

RedEnergy Stealer-as-a-Ransomware On The Rise

RedEnergy Stealer Mixes Infostealer and Ransomware in One

Researchers have discovered a new form of malware called RedEnergy Stealer. It is categorized as Stealer-as-a-Ransomware but is not affiliated with the Australian company Red Energy. A malware called RedEnergy stealer uses a sneaky tactic to steal sensitive data from different web browsers. Its fundamental spreading way circulates fake updates – pop-ups and banners that… Continue reading RedEnergy Stealer-as-a-Ransomware On The Rise

BlackCat Ransomware Employs Malvertising In Targeted Attacks

Advertising used to annoy you with its presence, but now it's a threat

Recently malicious actors started using malvertising to spread BlackCat ransomware. They use cloned webpages of popular freeware applications, particularly WinSCP utility. Such downloads result in an infection chain, that consists of a dropper, a backdoor, and, finally, the ransomware. Operators Distributing Ransomware Disguised as WinSCP Researchers acknowledged that BlackCat operators were using malicious ads to… Continue reading BlackCat Ransomware Employs Malvertising In Targeted Attacks

Super Mario Malware: Hackers Spread Stealers in the Fake Game

SupremeBot malware is being spread through a Trojanized Super Mario Game Installer.

The Super Mario video game franchise has gained immense acclaim due to its platforming gameplay, lively visuals, memorable characters. Recently, the franchise has experienced a renewed surge in popularity with the release of new games and animated movies. The franchise has consistently evolved by introducing innovative game mechanics, power-ups, and levels across titles and gaming… Continue reading Super Mario Malware: Hackers Spread Stealers in the Fake Game

Over 100k ChatGPT Accounts Are For Sale on the Darknet

If you used ChatGPT, your data may be on the darknet

According to a new report, over the past year, over 100k ChatGPT users’ accounts have been compromised using malware to steal information. India was in first place for the number of hacked accounts. ChatGPT in a Nutshell Perhaps every active Internet user has at least heard of a chatbot from OpenAI. Is it worth mentioning… Continue reading Over 100k ChatGPT Accounts Are For Sale on the Darknet