Topic: phishing attack

  • Inside the PureRAT Attack: From Info Stealer to Full Control

    Inside the PureRAT Attack: From Info Stealer to Full Control

    A sophisticated cyberattack begins with phishing emails using sideloading techniques to deploy malware, escalating from credential theft to deploying the full-featured PureRAT remote access trojan for complete system control. The campaign employs multiple layers of obfuscation, including custom c...

    Read More »
  • Fake npm 2FA Reset Email Used to Hijack Popular Code Packages

    Fake npm 2FA Reset Email Used to Hijack Popular Code Packages

    A phishing campaign compromised at least 18 widely used JavaScript npm packages, injecting malicious code to hijack cryptocurrency transactions and highlighting supply chain vulnerabilities. The attack began when a developer fell for a convincing phishing email, allowing the threat actor to take ...

    Read More »
  • Russian Hackers Bypass Two-Factor Authentication in New Attack

    Russian Hackers Bypass Two-Factor Authentication in New Attack

    Russian hackers bypassed two-factor authentication (2FA) using social engineering, exploiting legitimate account features like Gmail's "app password" to target high-profile individuals. A British researcher, Keir Giles, was tricked by hackers posing as U.S. officials, who used forged documents an...

    Read More »
  • FileFix Attack Evades Security with Cache Smuggling

    FileFix Attack Evades Security with Cache Smuggling

    A new FileFix social engineering attack uses cache smuggling to deliver malware undetected by disguising itself as a Fortinet VPN Compliance Checker and tricking users into executing hidden PowerShell commands. The attack involves copying a text string that secretly contains a script to search br...

    Read More »
  • NPM Supply-Chain Attack Thwarted: Hackers Foiled

    NPM Supply-Chain Attack Thwarted: Hackers Foiled

    A massive supply-chain attack on the NPM ecosystem was quickly neutralized, preventing a catastrophic security incident despite malicious updates reaching 10% of cloud environments. The attack began with a phishing compromise of a maintainer account, allowing tainted updates to widely used packag...

    Read More »
  • Popular NPM 'is' Package Infects 2.8M Weekly Users with Malware

    Popular NPM 'is' Package Infects 2.8M Weekly Users with Malware

    A widely-used NPM package called 'is' was compromised in a supply chain attack, distributing malware-infected versions (3.3.1 to 5.0.0) with a backdoor enabling remote code execution. Attackers used phishing via a fake npmjs.com domain to hijack maintainer accounts, pushing malicious updates to m...

    Read More »