Over the last few weeks the news of hackers build phishing pages using AWS apps. Also find here the threat alert – cloud network bandwidth now stolen through cryptojacking.
For more articles, check out our #onpatrol4malware blog.
87% of the ransomware found on the dark web has been delivered via malicious acros
Source: HelpNetSecurity
The findings uncovered 475 webpages of sophisticated ransomware products and services, with several high-profile groups aggressively marketing ransomware-as-a-service. Read more.
Threat Alert: Cloud network bandwidth now stolen through cryptojacking
Source: Aquasec
PKT cash is a decentralized blockchain that allows individuals to earn money by sharing their internet bandwidth. The algorithm is designed to calculate earnings based on the amount of shared network traffic with the community. Read more.
Blueprint for Ransomware Defense
Source: Institute for Security and Technology. AL
An action plan for ransomware mitigation, response, and recovery for small and medium-sized enterprises. The RTF called for the cybersecurity community to “develop a clear, actionable framework for ransomware mitigation, response, and recovery.” Read more.
Hackers Build Phishing Pages Using AWS Apps
Source: Avanan Check Point
In this attack brief, researchers at Avanan, a Check Point Software Company, will discuss how threat actors are creating phishing pages on AWS using the site’s legitimacy to steal credentials. Read more.
Healthcare is littered with failed attempts by big tech to break in. Here’s why
Source: SC Media
Many vendors, including some of the the most dominant players in the tech space, have a revolving door of healthcare leaders. Others hop in, then hop out again when the juice doesn’t quite prove worth the squeeze. Read more.
Threat in your browser: what dangers innocent-looking extensions hold for users
Source: SecureList by Kaspersky
Whether you want to block ads, keep a to-do list or check your spelling, browser extensions allow you to do all of the above and more, improving convenience, productivity and efficiency for free. Read more.
Shuckworm: Russia-Linked Group Maintains Ukraine Focus
Source: Broadcom Software
Recent Shuckworm activity observed by Symantec, a division of Broadcom Software, and aimed at Ukraine appears to be delivering information-stealing malware to targeted networks. Read more.
XCSSET Malware Update | macOS Threat Actors Prepare for Life Without Python
Source: SentinelOne
In this post, we review changes made to the latest versions of XCSSET and reveal some of the context in which these threat actors operate. Read more.