Delivering simplified cybersecurity alerts and information, ensuring you're always prepared to take immediate action.

APT36 Goes Cloudy ElizaRAT Puts Indian Systems in the Crosshairs
Malware

APT36 Goes Cloudy ElizaRAT Puts Indian Systems in the Crosshairs

Threat Group: APT36 (Transparent Tribe) Threat Type: Remote Access Trojan (RAT) Exploited Vulnerabilities: Windows, Linux-based espionage with cloud-based C2 communication Malware Used: ElizaRAT, ApoloStealer Threat Score: High (8.8/10) — Enhanced evasion and control tactics, leveraging multiple cloud services for concealment Last Threat Observation: November 2024 (AlienVault, Check Point Research)
3 min read
Interlock Ransomware Targets FreeBSD and Critical Infrastructure
Ransomware

Interlock Ransomware Targets FreeBSD and Critical Infrastructure

Threat Group: Interlock Threat Type: Ransomware Exploited Vulnerabilities: Network vulnerabilities; FreeBSD and VMware ESXi environments Malware Used: Interlock ransomware variants for FreeBSD and Windows Threat Score: High (8.0/10) — due to cross-platform targeting, focus on critical infrastructure, and double-extortion tactics Last Threat Observation: November 2024 Overview Interlock ransomware is
2 min read
Emerging Threat Play Ransomware Targets Critical Infrastructure
Ransomware

Emerging Threat Play Ransomware Targets Critical Infrastructure

Threat Type: Ransomware Exploited Vulnerabilities: Microsoft Exchange ProxyNotShell (CVE-2022-41040, CVE-2022-41082), FortiOS vulnerabilities (CVE-2018-13379, CVE-2020-12812), Remote Desktop Protocol (RDP) Malware Used: Play ransomware encryptor, custom VSS copying tool, Grixba information stealer Threat Score: Critical (9/10) — Enhanced threat level due to state-backed collaborations and increased targeting of high-value sectors Last Threat
3 min read
Espionage and Influence Meet Malware in UNC5812's Campaign Against Ukraine
Malware

Espionage and Influence Meet Malware in UNC5812's Campaign Against Ukraine

Threat Group: UNC5812 Threat Type: Hybrid Espionage and Influence Operation Exploited Vulnerabilities: Android and Windows vulnerabilities, including CVE-2024-47575 Malware Used: SUNSPINNER, PURESTEALER, CRAXSRAT, Pronsis Loader Threat Score: High (8.5/10) — due to multifaceted espionage and influence tactics targeting military sectors. Last Threat Observation: October 29, 2024 Overview UNC5812, a
2 min read
Docker Security Alert as TeamTNT Deploys Rootkits and Cryptominers
Malware

Docker Security Alert as TeamTNT Deploys Rootkits and Cryptominers

Threat Group: TeamTNT Threat Type: Cryptojacking, Cloud Container Exploitation Exploited Vulnerabilities: Misconfigured Docker APIs, SSH vulnerabilities in cloud environments Malware Used: Custom cryptomining scripts, Tsunami malware, Diamorphine rootkit Threat Score: Critical (9/10) — due to sophisticated, automated methods targeting widespread containerized and cloud infrastructures Last Threat Observation: October 2024, by
2 min read