Topic: powershell exploitation
-
How Hackers Weaponize Legitimate Tools for Cyberattacks
Threat actors increasingly use legitimate organizational tools through Living-off-the-Land (LotL) techniques, with 84% of modern cyberattacks exploiting trusted applications to bypass traditional defenses and evade detection. Attackers initiate breaches via social engineering, such as malicious V...
Read More » -
Don't Paste That TikTok Code! The Dangerous Scam Explained
A dangerous scam on TikTok, known as ClickFix, tricks users into installing information-stealing malware by posing as helpful tech support or free software guides, convincing them to run malicious commands on their own computers. These fraudulent videos, which promote fake methods for accessing p...
Read More » -
Stealthy Fileless Malware Spreads RAT via Legitimate Tools
A fileless malware campaign uses trusted tools like ScreenConnect and PowerShell to deploy a remote access Trojan, leaving minimal forensic traces and evading detection. The attack loads payloads directly into memory via reflection, employs a .NET launcher to establish persistence and disable sec...
Read More » -
Fake Windows BSOD Screens Deliver ClickFix Malware
A sophisticated phishing campaign targets the European hospitality industry by impersonating Booking.com, using a fake website and a fabricated Windows Blue Screen of Death error to trick users into manually installing malware. The attack deploys the DCRAT remote access trojan, which gains persis...
Read More » -
Chrome Extension Backdoor Disguised as Fake Crash Alerts
The malicious "NexShield" browser extension, a copy of a legitimate ad blocker, uses social engineering to trick users into running a harmful PowerShell command, deploying a remote access trojan that specifically targets corporate domain-joined computers. A separate, coordinated campaign involved...
Read More » -
Beware: Fake Booking.com Emails and BSODs Target Hotels
A sophisticated phishing campaign targets the European hospitality industry using convincing fake Booking.com emails to deliver the DCRat malware, which steals data and provides attackers with persistent remote access. The attack employs advanced social engineering, including a fake Windows error...
Read More » -
Can Your Phishing Detection Stop 2025's Security Threats?
Social engineering attacks like Clickfix surged 500% in early 2025, with cybercriminals increasingly using AI to create sophisticated Business Email Compromise scams that exploit human psychology rather than technical vulnerabilities. Clickfix bypasses traditional defenses by tricking users into ...
Read More »