Cybersec Sentinel

Cybersec Sentinel

Cybersec Sentinel: 30+ years of IT expertise, delivering clear, actionable cyber security insights.
Emerging Threat Play Ransomware Targets Critical Infrastructure
Ransomware

Emerging Threat Play Ransomware Targets Critical Infrastructure

Threat Type: Ransomware Exploited Vulnerabilities: Microsoft Exchange ProxyNotShell (CVE-2022-41040, CVE-2022-41082), FortiOS vulnerabilities (CVE-2018-13379, CVE-2020-12812), Remote Desktop Protocol (RDP) Malware Used: Play ransomware encryptor, custom VSS copying tool, Grixba information stealer Threat Score: Critical (9/10) — Enhanced threat level due to state-backed collaborations and increased targeting of high-value sectors Last Threat
3 min read
Espionage and Influence Meet Malware in UNC5812's Campaign Against Ukraine
Malware

Espionage and Influence Meet Malware in UNC5812's Campaign Against Ukraine

Threat Group: UNC5812 Threat Type: Hybrid Espionage and Influence Operation Exploited Vulnerabilities: Android and Windows vulnerabilities, including CVE-2024-47575 Malware Used: SUNSPINNER, PURESTEALER, CRAXSRAT, Pronsis Loader Threat Score: High (8.5/10) — due to multifaceted espionage and influence tactics targeting military sectors. Last Threat Observation: October 29, 2024 Overview UNC5812, a
2 min read
Docker Security Alert as TeamTNT Deploys Rootkits and Cryptominers
Malware

Docker Security Alert as TeamTNT Deploys Rootkits and Cryptominers

Threat Group: TeamTNT Threat Type: Cryptojacking, Cloud Container Exploitation Exploited Vulnerabilities: Misconfigured Docker APIs, SSH vulnerabilities in cloud environments Malware Used: Custom cryptomining scripts, Tsunami malware, Diamorphine rootkit Threat Score: Critical (9/10) — due to sophisticated, automated methods targeting widespread containerized and cloud infrastructures Last Threat Observation: October 2024, by
2 min read
SocGholish and FakeUpdate Evolved Threats in Browser-Based Attacks
Malware

SocGholish and FakeUpdate Evolved Threats in Browser-Based Attacks

Threat Group: TA569 (SocGholish operators) Threat Type: Malware Delivery via Fake Update Alerts Exploited Vulnerabilities: Compromised websites with JavaScript injection Malware Used: SocGholish (FakeUpdate), NetSupport RAT, Raspberry Robin Worm Threat Score: High (8.5/10) — Effective social engineering with broad targeting and advanced persistence techniques Last Threat Observation: October 2024
4 min read