med-mastodon.com is one of the many independent Mastodon servers you can use to participate in the fediverse.
Medical community on Mastodon

Administered by:

Server stats:

372
active users

#darkgate

1 post1 participant0 posts today
ESET Research<p><a href="https://infosec.exchange/tags/ClickFix" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ClickFix</span></a> went from virtually non-existent to the second most common attack vector blocked by <a href="https://infosec.exchange/tags/ESET" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ESET</span></a>, surpassed only by <a href="https://infosec.exchange/tags/phishing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>phishing</span></a>. This novel social engineering technique accounted for nearly 8% of all detections in H1 2025. <a href="https://infosec.exchange/tags/ESETresearch" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ESETresearch</span></a><br>ClickFix lures users by displaying bogus error messages followed by quick fix instructions, including copy-pasting malicious code. Running the code in the victim’s command line interpreter delivers malware such as <a href="https://infosec.exchange/tags/RATs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RATs</span></a>, infostealers, and cryptominers.<br>Between H2 2024 and H1 2025, ESET’s detection for ClickFix, HTML/FakeCaptcha, skyrocketed by 517%. Most detections in ESET telemetry were reported from Japan (23%), Peru (6%), and Poland, Spain, and Slovakia (&gt;5% each).<br>What makes <a href="https://infosec.exchange/tags/ClickFix" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ClickFix</span></a> so effective? The fake error message looks convincing; instructions are simple, yet the copied command is too technical for most users to understand. Pasting it into cmd leads to compromise with final payloads, including <a href="https://infosec.exchange/tags/DarkGate" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DarkGate</span></a> or <a href="https://infosec.exchange/tags/LummaStealer" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LummaStealer</span></a>. <br>While <a href="https://infosec.exchange/tags/ClickFix" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ClickFix</span></a> was introduced by cybercriminals, it’s since been adopted by APT groups: Kimsuky, Lazarus; Callisto, Sednit; MuddyWater; APT36. NK-aligned actors used it to target developers, steal crypto and passwords from Metamask and <a href="https://infosec.exchange/tags/macOS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>macOS</span></a> Keychain. <br><a href="https://infosec.exchange/tags/ClickFix" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ClickFix</span></a> uses psychological manipulation by presenting fake issues and offering quick solutions, which makes it dangerously efficient. It appears in many forms – error popups, email attachments, fake reCAPTCHAs – highlighting the need for greater vigilance online.<br>Read more in the <a href="https://infosec.exchange/tags/ESETThreatReport" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ESETThreatReport</span></a>:<br>🔗 <a href="https://welivesecurity.com/en/eset-research/eset-threat-report-h1-2025" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">welivesecurity.com/en/eset-res</span><span class="invisible">earch/eset-threat-report-h1-2025</span></a></p>
Kyle 🕵️‍♂️💻<p>Attackers Exploit Microsoft Teams and AnyDesk to Deploy DarkGate Malware <a href="https://thehackernews.com/2024/12/attackers-exploit-microsoft-teams-and.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">thehackernews.com/2024/12/atta</span><span class="invisible">ckers-exploit-microsoft-teams-and.html</span></a></p><p><a href="https://allthingstech.social/tags/DarkGate" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DarkGate</span></a> <a href="https://allthingstech.social/tags/Malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Malware</span></a> <a href="https://allthingstech.social/tags/CyberSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSec</span></a></p>
Jennifer Morency :mastodon:<p><a href="https://toot.community/tags/Malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Malware</span></a> infiltrates <a href="https://toot.community/tags/Pidgin" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Pidgin</span></a> messenger’s official plugin repository <a href="https://www.bleepingcomputer.com/news/security/malware-infiltrates-pidgin-messengers-official-plugin-repository/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/malware-infiltrates-pidgin-messengers-official-plugin-repository/</span></a> I used to use Pidgin to communicate with friends on AIM and similar messenger apps. The malicious plugin was offered only as a binary, not open source code. Worryingly, it had valid signatures, and so did the malware it downloaded. <a href="https://toot.community/tags/DarkGate" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DarkGate</span></a> <a href="https://toot.community/tags/Jabber" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Jabber</span></a> <a href="https://toot.community/tags/messenger" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>messenger</span></a></p>
:rss: Hacker News<p>Malware infiltrates Pidgin messenger's official plugin repository<br><a href="https://www.bleepingcomputer.com/news/security/malware-infiltrates-pidgin-messengers-official-plugin-repository/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/malware-infiltrates-pidgin-messengers-official-plugin-repository/</span></a><br><a href="https://rss-mstdn.studiofreesia.com/tags/ycombinator" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ycombinator</span></a> <a href="https://rss-mstdn.studiofreesia.com/tags/computers" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>computers</span></a> <a href="https://rss-mstdn.studiofreesia.com/tags/windows" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>windows</span></a> <a href="https://rss-mstdn.studiofreesia.com/tags/linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>linux</span></a> <a href="https://rss-mstdn.studiofreesia.com/tags/mac" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>mac</span></a> <a href="https://rss-mstdn.studiofreesia.com/tags/support" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>support</span></a> <a href="https://rss-mstdn.studiofreesia.com/tags/tech_support" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>tech_support</span></a> <a href="https://rss-mstdn.studiofreesia.com/tags/spyware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>spyware</span></a> <a href="https://rss-mstdn.studiofreesia.com/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a> <a href="https://rss-mstdn.studiofreesia.com/tags/virus" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>virus</span></a> <a href="https://rss-mstdn.studiofreesia.com/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> <a href="https://rss-mstdn.studiofreesia.com/tags/DarkGate" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DarkGate</span></a> <a href="https://rss-mstdn.studiofreesia.com/tags/Messenger" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Messenger</span></a> <a href="https://rss-mstdn.studiofreesia.com/tags/Pidgin" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Pidgin</span></a> <a href="https://rss-mstdn.studiofreesia.com/tags/Plugin" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Plugin</span></a> <a href="https://rss-mstdn.studiofreesia.com/tags/Supply_Chain" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Supply_Chain</span></a> <a href="https://rss-mstdn.studiofreesia.com/tags/Supply_Chain_Attack" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Supply_Chain_Attack</span></a> <a href="https://rss-mstdn.studiofreesia.com/tags/virus_removal" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>virus_removal</span></a> <a href="https://rss-mstdn.studiofreesia.com/tags/malware_removal" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware_removal</span></a> <a href="https://rss-mstdn.studiofreesia.com/tags/computer_help" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>computer_help</span></a> <a href="https://rss-mstdn.studiofreesia.com/tags/technical_support" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>technical_support</span></a></p>
Brad<p>From a social media post I wrote for my employer at ttps://www.linkedin.com/posts/unit42_darkgate-timelythreatintel-unit42threatintel-activity-7196580114761928704-Nblk/<br>and <a href="https://twitter.com/Unit42_Intel/status/1790814496845394110" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">twitter.com/Unit42_Intel/statu</span><span class="invisible">s/1790814496845394110</span></a></p><p>2024-05-14 (Tuesday): <a href="https://infosec.exchange/tags/DarkGate" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DarkGate</span></a> activity. HTML file asks victim to paste script into a run window. Indicators available at <a href="https://github.com/PaloAltoNetworks/Unit42-timely-threat-intel/blob/main/2024-05-14-IOCs-for-DarkGate-activity.txt" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/PaloAltoNetworks/Un</span><span class="invisible">it42-timely-threat-intel/blob/main/2024-05-14-IOCs-for-DarkGate-activity.txt</span></a></p><p>A <a href="https://infosec.exchange/tags/pcap" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pcap</span></a> of the <a href="https://infosec.exchange/tags/DarkGate" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DarkGate</span></a> infection traffic and the associated malware/artifacts are available at <a href="https://malware-traffic-analysis.net/2024/05/14/index.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">malware-traffic-analysis.net/2</span><span class="invisible">024/05/14/index.html</span></a></p>
Anonymous 🐈️🐾☕🍵🏴🇵🇸 :af:<p><a href="https://kolektiva.social/tags/DarkGate" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DarkGate</span></a> operators abused Google Ads technology to widen their malicious reach in a zero-day campaign that exploited the Windows Defender SmartScreen bypass vulnerability CVE-2024-21412. <br><a href="https://kolektiva.social/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <br>Here’s how the attack was <br>carried out <br><a href="https://www.trendmicro.com/en_us/research/24/c/cve-2024-21412--darkgate-operators-exploit-microsoft-windows-sma.html?utm_source=trendmicroresearch&amp;utm_medium=smk&amp;utm_campaign=032024_DarkGateSmartScreen" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">trendmicro.com/en_us/research/</span><span class="invisible">24/c/cve-2024-21412--darkgate-operators-exploit-microsoft-windows-sma.html?utm_source=trendmicroresearch&amp;utm_medium=smk&amp;utm_campaign=032024_DarkGateSmartScreen</span></a></p>
Anonymous 🐈️🐾☕🍵🏴🇵🇸 :af:<p><a href="https://kolektiva.social/tags/DarkGate" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DarkGate</span></a> operators abused Google Ads technology to widen their malicious reach in a zero-day campaign that exploited the Windows Defender SmartScreen bypass vulnerability CVE-2024-21412. </p><p>Here’s how the attack was carried out: ⬇️ <a href="https://research.trendmicro.com/4c7tw0d" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">research.trendmicro.com/4c7tw0</span><span class="invisible">d</span></a></p>
securityaffairs<p><a href="https://infosec.exchange/tags/Recent" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Recent</span></a> <a href="https://infosec.exchange/tags/DarkGate" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DarkGate</span></a> campaign exploited <a href="https://infosec.exchange/tags/Microsoft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Microsoft</span></a> <a href="https://infosec.exchange/tags/Windows" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Windows</span></a> zero-day<br><a href="https://securityaffairs.com/160457/malware/recent-darkgate-campaign-exploited-microsoft-zero-day.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">securityaffairs.com/160457/mal</span><span class="invisible">ware/recent-darkgate-campaign-exploited-microsoft-zero-day.html</span></a><br><a href="https://infosec.exchange/tags/securityaffairs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>securityaffairs</span></a> <a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacking</span></a> <a href="https://infosec.exchange/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a></p>
ricardo :mastodon:<p>Hackers exploit <a href="https://fosstodon.org/tags/Windows" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Windows</span></a> SmartScreen flaw to drop <a href="https://fosstodon.org/tags/DarkGate" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DarkGate</span></a> malware ⚠️ </p><p><a href="https://www.bleepingcomputer.com/news/security/hackers-exploit-windows-smartscreen-flaw-to-drop-darkgate-malware/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/hackers-exploit-windows-smartscreen-flaw-to-drop-darkgate-malware/</span></a></p>
The New Oil<p><a href="https://mastodon.thenewoil.org/tags/Microsoft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Microsoft</span></a> <a href="https://mastodon.thenewoil.org/tags/Teams" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Teams</span></a> <a href="https://mastodon.thenewoil.org/tags/phishing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>phishing</span></a> pushes <a href="https://mastodon.thenewoil.org/tags/DarkGate" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DarkGate</span></a> <a href="https://mastodon.thenewoil.org/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a> via group chats</p><p><a href="https://www.bleepingcomputer.com/news/security/microsoft-teams-phishing-pushes-darkgate-malware-via-group-chats/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/microsoft-teams-phishing-pushes-darkgate-malware-via-group-chats/</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a></p>
ricardo :mastodon:<p><a href="https://fosstodon.org/tags/Microsoft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Microsoft</span></a> Teams phishing pushes <a href="https://fosstodon.org/tags/DarkGate" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DarkGate</span></a> malware via group chats ⚠️</p><p><a href="https://www.bleepingcomputer.com/news/security/microsoft-teams-phishing-pushes-darkgate-malware-via-group-chats/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/microsoft-teams-phishing-pushes-darkgate-malware-via-group-chats/</span></a></p>
Brad<p>Social media post I wrote for my employer, available at <a href="https://www.linkedin.com/posts/unit42_darkgate-unit42threatintel-timelythreatintel-activity-7156413691289116672-W3GG" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">linkedin.com/posts/unit42_dark</span><span class="invisible">gate-unit42threatintel-timelythreatintel-activity-7156413691289116672-W3GG</span></a> and <a href="https://twitter.com/Unit42_Intel/status/1750648073603125757" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">twitter.com/Unit42_Intel/statu</span><span class="invisible">s/1750648073603125757</span></a></p><p>2024-01-25 (Thursday): <a href="https://infosec.exchange/tags/DarkGate" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DarkGate</span></a> active again this week. IOCs from an infection run earlier today are available at <a href="https://github.com/PaloAltoNetworks/Unit42-timely-threat-intel/blob/main/2024-01-25-IOCs-for-DarkGate-activity.txt" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/PaloAltoNetworks/Un</span><span class="invisible">it42-timely-threat-intel/blob/main/2024-01-25-IOCs-for-DarkGate-activity.txt</span></a></p><p>A <a href="https://infosec.exchange/tags/pcap" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pcap</span></a> of the infection traffic, along with the associated malware and artifacts from a <a href="https://infosec.exchange/tags/DarkGate" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DarkGate</span></a> infection are available at <a href="https://www.malware-traffic-analysis.net/2024/01/25/index.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">malware-traffic-analysis.net/2</span><span class="invisible">024/01/25/index.html</span></a></p>
Selena Larson<p>We just published details on a new&nbsp; activity cluster we are temporarily calling <a href="https://mastodon.social/tags/BattleRoyal" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BattleRoyal</span></a>. It started distributing <a href="https://mastodon.social/tags/DarkGate" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DarkGate</span></a> using distinct GroupIDs from Sept - Nov, then switched to <a href="https://mastodon.social/tags/NetSupport" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NetSupport</span></a>. Delivery methods include email and fake update lures <a href="https://www.proofpoint.com/us/blog/threat-insight/battleroyal-darkgate-cluster-spreads-email-and-fake-browser-updates" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">proofpoint.com/us/blog/threat-</span><span class="invisible">insight/battleroyal-darkgate-cluster-spreads-email-and-fake-browser-updates</span></a></p>
Brad<p>From a post I wrote for my employer at <a href="https://www.linkedin.com/posts/unit42_darkgate-timelythreatintel-unit42threatintel-activity-7132871065927655428-X2wP" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">linkedin.com/posts/unit42_dark</span><span class="invisible">gate-timelythreatintel-unit42threatintel-activity-7132871065927655428-X2wP</span></a> and <a href="https://twitter.com/Unit42_Intel/status/1727105445200814456" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">twitter.com/Unit42_Intel/statu</span><span class="invisible">s/1727105445200814456</span></a></p><p>2023-11-20 (Monday): <a href="https://infosec.exchange/tags/DarkGate" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DarkGate</span></a> infection from probable email. </p><p>List of IOCs available at <a href="https://github.com/PaloAltoNetworks/Unit42-timely-threat-intel/blob/main/2023-11-20-IOCs-for-DarkGate-infection.txt" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/PaloAltoNetworks/Un</span><span class="invisible">it42-timely-threat-intel/blob/main/2023-11-20-IOCs-for-DarkGate-infection.txt</span></a></p><p><a href="https://infosec.exchange/tags/pcap" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pcap</span></a> and malware samples available at <a href="https://www.malware-traffic-analysis.net/2023/11/20/index.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">malware-traffic-analysis.net/2</span><span class="invisible">023/11/20/index.html</span></a></p>

eSentire reported two cases of DarkGate stealer targeting finance and manufacturing industries since August 2023. The stealer was delivered via drive-by downloads disguised as fake installers for Advanced IP Scanner and fake document reports. The loader is using PPID spoofing to evade detections, and deploys DanaBot. Technical analysis and IOC provided.
Link: esentire.com/blog/from-darkgat

eSentireFrom DarkGate to DanaBotLearn more about the DarkGate and Danabot malware and get security recommendations from our Threat Response Unit (TRU) to protect your business from this cyber threat.

Post I wrote for my employer at linkedin.com/posts/unit42_dark and
twitter.com/Unit42_Intel/statu

2023-10-25 (Wednesday): #DarkGate malware distributed through fake invoice/billing emails with PDF attachments that spoof DocuSign.

As early as last week, these DarkGate loaders stopped retrieving a copy of Autoit3.exe and the .au3 file from the C2 server. Now, the copy of Autoit3.exe and the .au3 file is contained within a zip-ed .msi file that's hosted on a separate server.

The loader for DarkGate now grabs that .msi file instead.

We'll see how long that lasts.

Indicators from an infection run are available at github.com/PaloAltoNetworks/Un

A #pcap of the infection traffic, along with the associated malware/artifacts are now available at malware-traffic-analysis.net/2

📨 Latest issue of my curated #cybersecurity and #infosec list of resources for week #42/2023 is out! It includes the following and much more:

🔓 👀 Tracking Unauthorized Access to #Okta's Support System
🔓 🇯🇵 #Casio discloses #databreach impacting customers in 149 countries
🔓 🧬 Hacker leaks millions more #23andMe user records on #cybercrime forum
🔓 🇨🇳 D-Link confirms data breach after employee #phishing attack
🔓 💰 #Equifax Fined $13.5 Million Over 2017 Data Breach
🇺🇦 🧹 Ukrainian activists hack Trigona #ransomware gang, wipe servers
🇺🇸 🇰🇵 FBI: Thousands of Remote IT Workers Sent Wages to #NorthKorea to Help Fund Weapons Program
🇮🇳 ☁️ #India targets #Microsoft, #Amazon tech support #scammers in nationwide crackdown
🇵🇸 🇮🇷 #Hamas-linked app offers window into cyber infrastructure, possible links to Iran
👮🏻‍♂️ 🥷🏻 Police seize #RagnarLocker leak site
🇰🇵 North Korean Hackers Exploiting Recent #TeamCity Vulnerability
🇨🇳 🇷🇺 #China replaces #Russia as top #cyberthreat
🇺🇦 📡 CERT-UA Reports: 11 Ukrainian Telecom Providers Hit by Cyberattacks
🇫🇷 🇪🇸 #France frees the two biggest Spanish hackers
🇺🇸 ⚓️ Ex-Navy IT head gets 5 years for selling people’s data on #darkweb
🇨🇭 🗳️ #Switzerland’s e-voting system has predictable implementation blunder
🔓 🏭 Critical Vulnerabilities Expose ​​#Weintek HMIs to Attacks
🔓 🏭 #Milesight Industrial Router #Vulnerability Possibly Exploited in Attacks
🦠 🇻🇳 Fake #Corsair job offers on #LinkedIn push #DarkGate malware
🦠 Google-hosted #malvertising leads to fake #Keepass site that looks genuine
🦠 💬 #Discord still a hotbed of #malware activity — Now APTs join the fun
🦠 🕵🏻‍♂️ SpyNote: Beware of This Android #Trojan that Records Audio and Phone Calls
🛍️ 🦠 #Android will now scan sideloaded apps for malware at install time
💬 🔐 #WhatsApp #passkeys on the way, but as usual, for Android first
🇷🇺 🗂️ Pro-Russian Hackers Exploiting Recent #WinRAR Vulnerability in New Campaign
🗓️ ❌ Signal Pours Cold Water on Zero-Day Exploit Rumors
🔓 💥 #Cisco warns of new #IOS XE #zeroday actively exploited in attacks

📚 This week's recommended reading is: "RTFM: Red Team Field Manual v2" by Ben Clark and Nicholas Downer

Subscribe to the #infosecMASHUP newsletter to have it piping hot in your inbox every week-end ⬇️

infosec-mashup.santolaria.net/

X’s Infosec Newsletter · InfoSec MASHUP - Week 42/2023By Xavier «X» Santolaria