Topic: command and control

  • 'BRICKSTORM' Backdoor: Chinese Hackers Target US Firms

    'BRICKSTORM' Backdoor: Chinese Hackers Target US Firms

    A sophisticated cyber espionage campaign using the BRICKSTORM backdoor is targeting U.S. companies, particularly in legal, tech, and SaaS sectors, and is attributed to Chinese-aligned hackers with goals beyond intelligence gathering. The threat actors, known as UNC5221, employ a complex, multi-st...

    Read More »
  • Stealthy Fileless Malware Spreads RAT via Legitimate Tools

    Stealthy Fileless Malware Spreads RAT via Legitimate Tools

    A fileless malware campaign uses trusted tools like ScreenConnect and PowerShell to deploy a remote access Trojan, leaving minimal forensic traces and evading detection. The attack loads payloads directly into memory via reflection, employs a .NET launcher to establish persistence and disable sec...

    Read More »