SapphireStealer: Stealthiness, Flexibility and Malware Delivery

SapphireStealer is a unique open-source infostealer that already gained ill fame for attacks on corporations.

SapphireStealer is one such new information stealer to steal various browser credential databases and files containing users’ sensitive information. The codebase for SapphireStealer was made public on GitHub on December 25th, 2022. According to the research, SapphireStealer can steal a wide range of information from the target system, and be flexible in setup and evasion… Continue reading SapphireStealer: Stealthiness, Flexibility and Malware Delivery

DarkGate Loader Expands Activity, Delivers Ransomware

The developer leases DarkGate malware to its partners, increasing DarkGate malware activity

A new DarkGate malware deployment campaign has caught the attention of cybersecurity researchers. This was fueled by the developer’s decision to lease its product to a limited number of affiliates. DarkGate Malware Activity Spikes as Developer Rents Out It According to cybersecurity researchers, a new DarkGate malware campaign made a fuss. It spreads through phishing… Continue reading DarkGate Loader Expands Activity, Delivers Ransomware

Information Security Threats in Social Media

Social media compromises information security, but most people ignore it for some reason

Social media has become an important aspect of our everyday lives in this age of technology and information. Despite its numerous advantages, social media has raised concerns about protecting personal privacy. In particular, social networks pose a significant danger to information security – and it is mostly unspoken. But is this threat real? And how… Continue reading Information Security Threats in Social Media

Proxyjacking: The Latest Cybercriminal Invention In Action

Attackers hack into devices and turn them into proxy servers to make a profit

Today, in the constantly changing world of cyber threats, attackers always look for new ways to get more benefits with less effort. Recently, researchers found an example of this and called it proxyjacking for profit. What is proxyjacking? Proxyjacking is an attacker’s illegal use of a victim’s bandwidth for its own good. The closest related… Continue reading Proxyjacking: The Latest Cybercriminal Invention In Action

ChatGPT has become a New tool for Cybercriminals in Social Engineering

Scammers massively use ChatGPT to create convincing phishing emails

Artificial intelligence has become an advanced tool in today’s digital world. It can facilitate many tasks, help solve complex multi-level equations and even write a novel. But like in any other sphere, cybercriminals here have found some profit. With ChatGPT, they can deceive a user correctly and skillfully and thus steal his data. The key… Continue reading ChatGPT has become a New tool for Cybercriminals in Social Engineering

BlackGuard Receives Update, Targets More Cryptowallets

BlackGuard is now able to attack up to 57 crypto wallets and extensions

BlackGuard, a prolific infostealer malware, received an update at the edge of 2023. The new update introduced advanced data-stealing capabilities and secure connectivity features. The new version also includes a row of new anti-detection and anti-analysis capabilities. Let’s have a more detailed look into this malware and see the difference from all aspects. BlackGuard Stealer… Continue reading BlackGuard Receives Update, Targets More Cryptowallets

Common Cryptocurrency Scams and Frauds: How to Avoid

Fraudsters never cease to amaze with their ingenuity. Cryptocurrency scams can take many forms. They even go so far as to enter into fake relationships through dating apps.

Fraudsters do not stand still and are always looking for new ways to steal money. Unfortunately, the massive growth of cryptocurrency in recent years has created the perfect ground for it. According to Chainalysis, cryptocurrency crime in 2021 was a record year, with fraudsters stealing $14 billion worth of cryptocurrency this year alone. So if… Continue reading Common Cryptocurrency Scams and Frauds: How to Avoid

Conti Ransomware Shutdown, Site Disabled

Conti operators shut down the remnants of the public infrastructure. Two servers on the Tor network that were used to publish victims’ data and negotiate ransoms are down. The Conti News website’s admin panel and the stolen information storage were closed a month ago, and the list of non-payers has not been updated all this… Continue reading Conti Ransomware Shutdown, Site Disabled