In late October 2024, Cleafy’s Threat Intelligence team noticed a surge in a new Android malware known as TgToxic. However, deeper analysis showed that, despite some similarities to TgToxic commands, the code is quite different. Many typical TgToxic features are missing, and some commands are just placeholders. Consequently, the team …
Read More »APT36 to attack Windows Systems Absuing Google Drive & Slack
ElizaRAT is malware that mainly targets Windows systems and acts as a remote access tool (RAT), allowing attackers to access infected devices without permission. This malware is often distributed through phishing campaigns or malicious downloads. CheckPoint researchers found that APT36 (aka “Transparent Tribe”) is a Pakistan-based APT group, hackers are …
Read More »Hacker offer Titas gas root access to sale
“A threat actor has reportedly claimed to gain root-level access to Titas Gas’s firewall server and is actively offering this access for sale on the dark web, posing a serious risk to Bangladesh’s energy infrastructure”. Bangladesh Cyber Security Intelligence (BCSI) reported that someone has reportedly gained unrestricted access to Titas …
Read More »Hacker claim data breach: bank confirms blaming third party
Interbank, a major financial institution in Peru, has confirmed a data breach after a hacker leaked stolen data online. Formerly the International Bank of Peru, the company offers financial services to over 2 million customers. “To our clients: We regret this situation and understand the inconvenience this may cause you. …
Read More »Bangladeshi hacker hack for girlfriend’s expenses; finally caught
Fazle Hassan Anik hacked girls’ Facebook accounts to steal sensitive pictures, which he used to blackmail them for money. He used the money to pay for his own and his girlfriend’s expenses. In the past two years, Anik blackmailed at least 15 people by hacking over 50 Facebook accounts. He …
Read More »Bangladeshi Social media flooded with unauthorized withdrawals from bank accounts
Bangladeshi Social media posts have raised concerns about unauthorized withdrawals from bank accounts, affecting at least 7 to 8 people who hold dual currency or credit cards. Initial findings suggested two banks are reported to impacted. Bangladesh Cyber Security Intelligence (BCSI) reported unauthorized transactions made via Facebook Ad Manager, often …
Read More »Unprotected UN Database Exposes 228GB of Gender Violence Victims’ Data
Cybersecurity researcher Jeremiah Fowler found a non-password-protected database with 115,000 records linked to the UN Trust Fund to End Violence against Women. This fund aims to prevent violence against women and girls by supporting organizations that address gender-based violence and promote women’s rights. The unprotected database contained sensitive financial reports, …
Read More »2nd time hacker breached Internet Archive
The Internet Archive was breached again, this time through their Zendesk email support platform, following warnings that threat actors had stolen exposed GitLab authentication tokens. Bleeping computer reported, Since last night, the authority received numerous messages from people who received replies to their old Internet Archive removal requests, warning that …
Read More »Microsoft’s Alarming Report: 600 Million Cyberattacks perday
Cybersecurity threats have surged to extraordinary heights, as Microsoft’s latest Digital Defense Report reveals that its customers are confronted with over 600 million cyberattacks every day. The report highlights that cyber operations play a crucial role in geopolitical conflicts, used for espionage, influence, and destruction. The cooperation between nation-states and …
Read More »Researchers Break RSA Encryption with Quantum Computing
Chinese researchers, led by Wang Chao from Shanghai University, have cracked RSA encryption using quantum computers. This achievement raises serious concerns about the future of cryptographic systems, as quantum computers can now threaten long-standing methods of global data security. The Research Breakthrough: Cracking RSA Encryption A study in the Chinese …
Read More »