White Tur Uses APT 28 Technique

White Tur Uses APT 28 Technique

A new threat actor, White Tur, has been observed using multiple techniques borrowed from various APT actors. An attack was discovered , in which the threat actor registered a subdomain (mail.mod.qov.rs) to…
BazarLoader Used for Reconnaissance

BazarLoader Used for Reconnaissance

A BazarLoader Windows malware campaign has been detected hosting one of their malicious files on Microsoft’s OneDrive service. This BazarLoader Windows malware enables the threat actors backdoor access and network…
FIN7 Drops Payloads

FIN7 Drops Payloads

A recent spear-phishing attacks conducted by financially motivated threat actor FIN7 using weaponized Windows 11 Alpha-themed Word documents with Visual Basic macros to drop malicious payloads, including a JavaScript backdoor.…

TA456 Exfilerates

The security researchers uncovered, TA456 which is also known as “Tortoiseshell” and “Imperial Kitten” has recently executed several targeted attacks on defense contractors with malware. The hackers of this group…
Zloader Loads Macros Headache

Zloader Loads Macros Headache

Phishing campaigns that distribute weaponized Microsoft Office documents to prompt victims to enable macros in order to trigger the infection chain directly, new findings indicate attackers are using non-malicious documents…

MacOS macros in to spotlight

Building successful macro attacks means getting past several layers of security, but a Black Hat speaker found a way through.Microsoft Office is no stranger to vulnerabilities and exploits. Most of…