Navigate the evolving landscape of cyber threats with expert insights, threat analysis, and cutting-edge security solutions. Stay protected in an increasingly connected world.
Threat Actors often leverage domain-based infrastructure to host and facilitate malicious operations. When actors deploy these new domains, they often leave patterns that can be used to signature the infrastructure and link it to past known activity.
The infamous threat actor Real888, known for targeting major enterprises worldwide, has successfully breached Abans PLC. The compromised database reportedly includes sensitive customer information such as telephone numbers, email addresses, and transaction details. This breach underscores the critical need for enhanced cybersecurity measures to protect against sophisticated adversaries.
Sri Lanka has repeatedly found itself in the crosshairs of nation-state hackers over the past years, yet the nation's cybersecurity posture remains alarmingly underdeveloped. This negligence has left critical infrastructure and citizens exposed to relentless cyber threats.
The investigation revealed a sophisticated Malware-as-a-Service (MaaS) operation leveraging the Kodiak open-source Command and Control (C2) framework to deploy Remote Access Trojans (RATs) and associated payloads. Analysts uncovered critical intelligence, including the identification of malicious IP addresses, open ports with RAT indicators, and operational missteps by the threat actor, such as exposing their username in SSL/TLS certificate fields.
Help
Subscribe to newsletter
Secualyze Copyright 2024. Developed by Vebula