Cybersec Sentinel

Cybersec Sentinel

Cybersec Sentinel: 30+ years of IT expertise, delivering clear, actionable cyber security insights.
Malware Hidden Behind Google Meet Deception in ClickFix Campaign
Malware

Malware Hidden Behind Google Meet Deception in ClickFix Campaign

Threat Group: Slavic Nation Empire, Scamquerteo Threat Type: Infostealer Malware, Social Engineering Exploited Vulnerabilities: Application Layer Protocol (T1071), User Execution (T1204), Phishing (T1566), PowerShell (T1059.001) Malware Used: Stealc, Rhadamanthys, AMOS Stealer Threat Score: High (8.2/10) — The campaign employs sophisticated social engineering tactics, targeting both Windows and macOS
4 min read
UAT-5647’s SingleCamper Malware: A Silent Network Infiltrator
Malware

UAT-5647’s SingleCamper Malware: A Silent Network Infiltrator

Threat Group: RomCom (aka UAT-5647) Threat Type: Remote Access Trojan (RAT) Exploited Vulnerabilities: Spear-phishing, network tunneling, credential theft Malware Used: SingleCamper RAT, RustyClaw, MeltingClaw, DustyHammock, ShadyHammock Threat Score: High (8.3/10) — Advanced persistence mechanisms, stealthy network operations, and a dual-focus on espionage and ransomware deployment Last Threat Observation: October
4 min read
OilRig APT Escalates Cyber Espionage with Windows Kernel Exploits and Persistent Attacks
Malware

OilRig APT Escalates Cyber Espionage with Windows Kernel Exploits and Persistent Attacks

Threat Group: OilRig (APT34, Earth Simnavaz, Crambus, Cobalt Gypsy, GreenBug, Helix Kitten, Hazel Sandstorm) Threat Type: Cyberespionage Exploited Vulnerabilities: CVE-2024-30088 (Windows Kernel Privilege Escalation), Microsoft Exchange Web Services Malware Used: Menorah, STEALHOOK, SC5k, OilCheck, ODAgent, OilBooster Threat Score: High (8.5/10) — Exploitation of advanced kernel vulnerabilities and widespread espionage
2 min read