news

Breaking Cyber News From Cyberint

Breaking news feed of the latest cyber incidents, breaches, vulnerabilities, malware, ransomware and so much more.

  • May 08, 2025

    • United States
    • Betway
    • North America
    • Business Services
    • Avid Technology

    Threat Actor Sells Data Belonging to Avid CRM

    In May 2025, a threat actor named "betway" claimed to have breached Avid.com, a U.S.-based media technology company with over $294.1 million in revenue. The threat actor stated they exfiltrated over 10 million rows of user data, including contact information, job titles, addresses, phone numbers, emails, account details, and internal CRM metadata. The dataset was listed for public sale with an asking price starting at $40,000.

  • May 08, 2025

    • Asia
    • Japan
    • Pr Times
    • Eastern Asia
    • Business Services

    PR Times Reports Data Breach - Exposing Data of 900K

    In May 2025, PR TIMES reported it had become the victim of a data breach when threat actors managed to gain access to its database. According to PR TIMES, over 900,000 pieces of data belonging to customers were taken, including personal information from enterprise users, media users, individual users, and sensitive pre-release press materials. The Breach occurred on April 24th, 2025.

  • May 08, 2025

    • Asia
    • Im Corporation
    • Blf0Ty
    • Japan
    • Eastern Asia
    • Manufacturing

    Threat Actor Claims to Have Breached IM Corporation, a Japanese Manufacturing Company

    In May 2025, a threat actor named BLF0ty claimed to have breached im-eng.jp and to have gained access to its database. According to the threat actor, 1.88 GB of data belonging to im-eng.jp's customers was taken, including information related to hydraulic cylinder design and the manufacturing and processing of automobile parts.

  • May 07, 2025

    • CVE-2024-6047
    • Cve-2018-10561
    • Asia
    • Mirai
    • Cve-2024-11120
    • Cve-2024-6047
    • CVE-2024-11120
    • CVE-2018-10561
    • Eastern Asia
    • Geovision
    • Manufacturing
    • Taiwan

    Exploitation of Geovision IoT Devices by Mirai Botnet

    Threat actors are actively exploiting security vulnerabilities in end-of-life Geovision IoT devices to incorporate them into a Mirai botnet, which is being used to conduct distributed denial-of-service (DDoS) attacks. The exploitation involves command injection flaws that allow attackers to execute arbitrary system commands, specifically targeting the /datesetting.cgi endpoint. As these devices are unlikely to receive patches due to their outdated firmware, users are advised to upgrade to newer models to protect against these threats.

  • May 07, 2025

    • United Kingdom
    • Government
    • Uk Government
    • Europe

    UK's Legal Aid Agency Reports Data Breach

    In May 2025, the UK Legal Aid Agency (LAA) became the victim of a data breach when threat actors managed to gain access to its systems. According to the LAA, there is a risk that financial information belonging to legal aid providers, including barristers and solicitor firms, may have been compromised, although the agency could not confirm if any data was accessed.

  • May 06, 2025

    • Government
    • Africa
    • Rhpolice.Sec.Gouv.Sn
    • Senegal
    • Sub-Saharan Africa
    • Kazu

    Threat Actor Claims to Have Breached Senegal's National Police, Extracting Over 150 GB of Data

    In May 2025, threat actors named "Kazu" and "Joe" claimed to have breached the Senegal National Police's HR portal and to have gained access to its database. According to the threat actor, 152GB of data belonging to the Senegal Police's personnel was taken, including sensitive information such as ID cards, passports, education certificates, birth certificates, certificates of nationality, CVs, personal service records, certificates of good conduct, and authorizations to compete.

  • May 06, 2025

    • Africa
    • Finance
    • Sudo_Xxxx
    • Bmci
    • Morocco
    • Northern Africa

    Threat Actor Claims to Have Breached Moroccan BMCI Bank

    In May 2025, a threat actor named sudo_xxxx claimed to have breached BMCI Bank and gained access to its database. According to the threat actor, a substantial amount of data belonging to the bank's customers was taken, including client IDs, passwords, and account balances.

  • May 05, 2025

    • Asia
    • Israel
    • Telemessage
    • Telecommunications
    • Middle East

    Threat Actor Claims to Have Breached TeleMessage

    In May 2025, a threat actor breached TeleMessage, an Israeli company that provides modified versions of messaging apps like Signal, WhatsApp, Telegram, and WeChat to U.S. government agencies for message archiving. The threat actor accessed archived message contents, usernames and passwords for backend systems, and contact details for officials from agencies such as Customs and Border Protection, as well as employees of companies like Coinbase and Galaxy Digital. The data included snapshots of unencrypted messages, backend credentials, and communication metadata stored on TeleMessage’s servers.

  • May 05, 2025

    • Terralogger
    • Terrastealerv2
    • Golden Chickens

    Golden Chickens Unveils New Malware Families: TerrastealerV2 and Terralogger

    The threat actor group known as Golden Chickens, also referred to as Venom Spider, has been linked to two new malware families, TerrastealerV2 and Terralogger, which are designed for credential theft and keylogging respectively. TerrastealerV2 collects sensitive data such as browser credentials and cryptocurrency wallet information, while Terralogger functions as a standalone keylogger without exfiltration capabilities. Both malware variants are believed to be in active development, showcasing the group's ongoing efforts to enhance their malware arsenal, which operates under a malware-as-a-service model. The group is reportedly based in Canada and Romania, and their activities have been ongoing since at least 2018.

  • May 04, 2025

    • United States
    • Commvault Systems
    • North America
    • Cve-2025-3928
    • CVE-2025-3928
    • Business Services

    Commvault - Breach - 2025-02-20

    In February 2025, Commvault became the victim of a data breach when threat actors managed to gain access to its Azure cloud environment through a zero-day vulnerability. According to Commvault, unauthorized access affected a small number of customers, although there was no evidence that any customer data was compromised.

  • May 04, 2025

    • United States
    • North America
    • Manufacturing
    • Terrasource Global

    TerraSource Reports Data Breach Following Unauthorized Access by a Third Party

    In May 2025, TerraSource Global became the victim of a data breach when threat actors managed to gain access to its database. According to TerraSource, sensitive personal identifiable information and protected health information belonging to an undetermined number of individuals was taken, including names, social security numbers, dates of birth, addresses, driver’s license numbers, government-issued ID numbers, financial information, medical information, and health insurance information.

  • May 04, 2025

    • Insurance Agents, Brokers And Service
    • Finance
    • Media
    • Russia
    • Energy
    • Hive0117
    • Eastern Europe
    • Telecommunications
    • Manufacturing
    • Phishing
    • Transportation
    • Europe
    • Retail
    • Tourism

    Phishing Campaign Targets Russian Industries with Darkwatchman Malware

    A large-scale phishing campaign has been targeting Russian companies across various sectors, including media, finance, and energy, using the Darkwatchman malware. Attributed to the financially motivated group Hive0117, the campaign has seen multiple waves of attacks since September 2023, employing social engineering tactics such as courier delivery themes to lure victims into opening password-protected malicious archives. Darkwatchman, a sophisticated JavaScript-based remote access trojan, is capable of keylogging and evading detection, posing significant risks to the targeted industries in Russia, Kazakhstan, Latvia, and Estonia.

  • Apr 30, 2025

    • Government
    • Asia
    • Shadowpad
    • Sentinelone
    • Goreshell
    • Purplehaze
    • South-Eastern Asia

    SentinelOne Uncovers Chinese Espionage Campaign Targeting its Infrastructure and Clients

    SentinelOne has identified a China-nexus threat cluster named PurpleHaze, which has been conducting reconnaissance against its infrastructure and high-value customers. This hacking group is loosely associated with the state-sponsored group APT15 and has targeted a South Asian government entity using a Windows backdoor called GoReShell. The attackers have employed an operational relay box network to enhance their cyberespionage capabilities. Previous attacks involved the use of ShadowPad, a backdoor linked to various espionage activities, indicating a potential overlap in operations

  • Apr 30, 2025

    • Latin America And The Caribbean
    • Cypher404X
    • Telecommunications
    • Venezuela
    • Movistar Venezuela

    Threat Actor Claims to Have Breached Movistar Venezuela

    In April 2025, a threat actor named "Cypher404x" claimed to have breached Movistar Venezuela and to have gained access to its database. According to the threat actor, 4,376,105 records belonging to Movistar's customers were taken, including personal data.

  • Apr 29, 2025

    • United States
    • Woocommerce
    • North America
    • Phishing
    • Business Services

    Phishing Campaign Targets WooCommerce Users with Fake Security Alerts

    Cybersecurity researchers have identified a large-scale phishing campaign targeting WooCommerce users, where victims receive fake security alerts urging them to download a 'critical patch.' This malicious activity, is believed to be a variant of a previous campaign that used a fake CVE to breach sites running the popular content management system. The phishing emails lead users to a spoofed WooCommerce marketplace page, where they inadvertently download malware that creates a new administrator account on their site, allowing attackers remote control to inject spam, redirect visitors, or even launch DDoS attacks.

  • Apr 28, 2025

    • Financial Theft
    • United States
    • Asia
    • Finance
    • North America
    • Israel
    • Paypal
    • Phishing
    • Middle East

    Phishing Campaign Exploiting ISRAELI COSTUMERS, USING PayPal’s Donation Feature

    Over the past 24 hours, a phishing campaign has been circulating in Israel that exploits PayPal’s donation feature to convey an appearance of legitimacy. Attackers send SMS messages demanding payment of shipping fees. Rather than directing recipients to a fraudulent website to steal credit-card details, the message links to a genuine PayPal donation page displaying the same amount requested in the SMS. To bolster perceived legitimacy, threat actors overlay the PayPal interface with familiar logos, such as Israel Post, and copy PayPal’s styling and copy almost verbatim. The attackers rely on the victim’s trust in PayPal’s brand. Once the victim submits payment, the funds are transferred directly into the attacker’s PayPal account.

  • Apr 28, 2025

    • United States
    • L33Tfg
    • North America
    • Pjm Interconnection
    • Critical Infrastructures

    Threat Actor Claims Breach of PJM Interconnection

    In April 2025, a threat actor named l33tfg claimed to have breached PJM Interconnection LLC, the largest electric transmission system in North America, and to have gained access to its database. According to the threat actor, over 4,000 leaked database entries belonging to PJM's customers were taken, including personal information such as names, email addresses, and phone numbers.

  • Apr 28, 2025

    • Latin America And The Caribbean
    • Dinac
    • Automotive
    • Gatito_Fbi_Nz
    • Paraguay

    Threat Actor Claims to Have Breached DINAC - The National Directory of Civil Aeronautics of Paraguay

    In April 2025, a threat actor named Gatito_FBI_Nz claimed to have breached the Dirección Nacional de Aeronáutica Civil (DINAC) in Paraguay and to have gained access to its database. According to the threat actor, a complete leak was extracted from the cloud system, which included several internal documents believed to be related to national security, such as curriculum vitae and other sensitive information.

  • Apr 27, 2025

    • Asia
    • Arabian_Ghosts
    • Israel
    • Network Denial Of Service
    • Mprest
    • Middle East
    • Business Services

    DDoS Attack on mPrest, an Israeli Technology Company Specializing in Critical Infrastructure

    On April 27th, the hacktivist group Arabian Ghosts claimed to have launched a DDoS attack against the website of mPrest, an Israeli technology company specializing in software and smart control systems for sectors such as energy, defense, and critical infrastructure. Using the hashtag #OpIsrael, suggesting a connection to the broader OpIsrael campaign.

  • Apr 27, 2025

    • Israel Port
    • Asia
    • Arabian_Ghosts
    • Israel
    • Critical Infrastructures
    • Network Denial Of Service
    • Middle East

    DDoS Attack on Israel Ports Company (Israports)

    On April 27th, the hacktivist group Arabian Ghosts claimed to have launched a DDoS attack against the website of Israel Ports Company (Israports), the state-owned company responsible for developing and maintaining Israel’s seaport infrastructure. Using the hashtag #OpIsrael , suggesting a connection to the broader OpIsrael campaign.

  • Apr 27, 2025

    • Resource Hijacking
    • Education
    • Password Spraying
    • Storm-1977

    Storm-1977 Targets Education Sector with Password Spraying Attacks

    Investigators have reported that a threat actor known as Storm-1977 has been conducting password spraying attacks against cloud tenants in the education sector over the past year. The attacks utilize a command-line interface tool called azurechecker.exe, which connects to an external server to retrieve AES-encrypted data containing a list of targets. The attackers have successfully compromised accounts, creating resource groups and deploying over 200 containers for illicit cryptocurrency mining.

  • Apr 24, 2025

    • Asia
    • Insurance Agents, Brokers And Service
    • Finance
    • Israel
    • Israel'S National Insurance
    • Phishing
    • Middle East

    Phishing Campaign Targets Israelis with Fake Bituach Leumi Emails

    CERT-IL warns of a phishing campaign impersonating Israel’s National Insurance Institute. Victims receive fake emails urging them to download a “report,” which installs ScreenConnect RAT, granting attackers remote access. The campaign uses spoofed domains and a disguised .exe file. Authorities urge caution and IOC monitoring.

  • Apr 24, 2025

    • Chile
    • 3Ipe
    • Latin America And The Caribbean
    • Sentap
    • Business Services

    Threat Actor Sells Data Belonging to 3ipe

    In April 2025, a threat actor named Sentap claimed to have breached 3ipe.com and to have gained access to its database. According to the threat actor, 568 GB of exclusive engineering and commercial data belonging to 3ipe's customers was taken, including technical and scientific documents, commercial and project data, visual content, geographic data, management tools, and human resources archives. The threat actor is selling the dataset for 12 thousand dollars.

  • Apr 24, 2025

    • Murkytour
    • Asia
    • Blackshadow
    • Middle East
    • Lonefleet
    • Israel
    • Match Legitimate Name Or Location
    • Data From Local System
    • Web Protocols
    • Spearphishing Link
    • Malicious File
    • Command And Scripting Interpreter

    Iran-Linked Hackers Deploy MURKYTOUR Malware in Fake Job Scheme Targeting Israel

    In October 2024, Iranian-aligned threat actor UNC2428 launched a sophisticated cyber espionage campaign against Israel using a backdoor malware named MURKYTOUR. Disguised as a job recruitment effort from Israeli defense contractor Rafael, the attackers lured victims into downloading a fake job application tool called "RafaelConnect.exe." The installer, dubbed LONEFLEET, featured a convincing graphical interface to collect personal data and resumes. Meanwhile, the MURKYTOUR malware was covertly deployed via a launcher known as LEAFPILE, granting the hackers persistent access to infected systems. This campaign, linked to Iran’s Ministry of Intelligence and Security (MOIS), overlaps with activity attributed to the Iranian group Black Shadow and is part of broader Iranian efforts targeting multiple sectors in Israel.

  • Apr 24, 2025

    • Europe
    • Eastern Europe
    • Government
    • Russia

    Russian Military Targeted by New Android Spyware Campaign

    Cybersecurity researchers have uncovered a malicious campaign targeting Russian military personnel, distributing Android spyware disguised as the Alpine Quest mapping software. The malware, identified as android.spy.1292.origin, is embedded in modified versions of the app and is propagated through Russian app catalogs and fake Telegram channels. Once installed, it collects sensitive data such as phone numbers, contact lists, geolocation, and stored files, while also allowing attackers to exfiltrate files via Telegram and WhatsApp. The campaign exploits the app's popularity among military users, emphasizing the need for caution when downloading apps from untrusted sources.

  • Apr 23, 2025

    • Dji
    • Asia
    • China
    • Eastern Asia
    • Technology
    • R00Tk1T

    R00TK1T Claims DJI Customer Data Theft

    On April 21, 2025, a threat actor group identifying as "R00TK1T" publicly claimed responsibility for breaching DJI’s systems and exfiltrating a large amount of sensitive customer data. According to their statement, the stolen information includes order details, customer names, tracking numbers, pricing, drone specifications, contact information, and payment methods. The group is allegedly selling the data through a private channel.

  • Apr 23, 2025

    • Asia
    • Israel
    • Go-Net Software Solutions
    • Middle East
    • Business Services
    • Cyber Toufan Operation

    Cyber Toufan Claims Breach of Israeli Software Firm 'Go-Net'

    The pro-Palestinian hacktivist group Cyber Toufan claimed responsibility for breaching the Israeli software development firm Go-Net Software Solutions, which allegedly provides services to entities such as the IDF, insurance companies, banks, etc. In a Telegram post, the group alleged it had maintained persistent access to Go-Net’s network for over a year, during which it exfiltrated source code and internal databases. A sample of the stolen data was released publicly, with more sensitive material reportedly shared with affiliated threat actors. Go-Net has yet to comment on the incident, and the extent of the breach remains unverified.

  • Apr 23, 2025

    • Nepal
    • Government
    • Asia
    • Southern Asia
    • Kazu
    • Nepal Police

    Threat Actor Claims to Have Breached The Nepal Police

    In April 2025, a threat actor named Kazu claimed to have breached the Nepal Police Central Website and to have gained access to its database. According to the threat actor, over 2 million records belonging to Nepal Police's citizens were taken, including face images, ID cards, passports, and personally identifiable information (PII).

  • Apr 23, 2025

    • Asia
    • South Korea
    • Eastern Asia
    • Telecommunications
    • Sk Telecom

    SK Telecom Reports Breach To Customer's USIM Data

    In April 2025, SK Telecom became the victim of a data breach when threat actors managed to gain access to its database through a malware infection. According to SK Telecom, sensitive USIM-related information could have been exposed, including international mobile subscriber identity (IMSI), mobile station ISDN number (MSISDN), authentication keys, and network usage data.

  • Apr 23, 2025

    • United States
    • Docker
    • Business Services
    • North America

    New Malware Campaign Targets Docker Environments for Cryptocurrency Mining

    Cybersecurity researchers have uncovered a new malware campaign that specifically targets Docker environments using a previously undocumented technique to mine cryptocurrency. This campaign involves deploying a heavily obfuscated Python script through a container image from Docker Hub, which connects to a decentralized service called Teneo to earn rewards without actual data scraping. Unlike traditional cryptojacking methods that utilize miners like XMRig, this approach focuses on exploiting the compute resources of misconfigured Docker instances.

  • Apr 22, 2025

    • Asia
    • Southern Asia
    • Indigo
    • India
    • Transportation
    • Energyweaponuser

    Threat Actor Sells IndiGo Flight Data

    In April 2025, a threat actor named "EnergyWeaponUser" claimed to be selling a database allegedly linked to IndiGo flight ticket bookings. The data, reportedly originating from the United Arab Emirates (UAE), includes message delivery logs with headers such as CountryName, Message, DestinationPhone, and DeliveryTime. The threat actor has offered the data for $500.

  • Apr 22, 2025

    • Government
    • Asia
    • Transportation
    • Sagerunex
    • Construction
    • Media
    • Lotus Blossom
    • Eastern Asia
    • Telecommunications
    • Taiwan
    • South-Eastern Asia
    • Hong Kong
    • Vietnam
    • Transportation By Air
    • Philippines

    Lotus Panda Cyber Espionage Campaign Targets Southeast Asia

    The China-linked cyber espionage group known as Lotus Panda has been attributed to a campaign that compromised multiple organizations in an unnamed Southeast Asian country between August 2024 and February 2025. Targets included a government ministry, an air traffic control organization, a telecom operator, and a construction company. The attacks utilized various custom tools, including loaders, credential stealers, and a reverse SSH tool. This campaign is seen as a continuation of previous activities by Lotus Panda, which has targeted the government and military sectors in Southeast Asia since 2009. The latest wave of attacks involved sophisticated techniques to sideload malicious files and exfiltrate sensitive information.

  • Apr 22, 2025

    • Supercard X
    • Italy
    • Finance
    • Southern Europe
    • Europe

    Supercard X: New Android Malware Facilitating NFC Relay Attacks

    Investigators have discovered a new Android malware-as-a-service platform named Supercard X, which enables threat actors to conduct NFC relay attacks targeting banking customers in Italy. The malware employs social engineering tactics, including smishing and phone calls, to trick victims into installing malicious apps that capture payment card data. By manipulating victims into bringing their cards close to infected devices, attackers can relay card information to conduct unauthorized transactions. The campaign represents a significant financial risk to banking institutions and payment providers, highlighting the effectiveness of combining malware with NFC relay techniques.

  • Apr 21, 2025

    • Interlock

    Interlock Employs ClickFix Sites In Its Ransomware Attacks

    On April 21, 2025, cybersecurity experts warned of a rise in attacks by the Interlock ransomware group, known for its double extortion tactics and a dark web leak site. Active since late 2024, Interlock uses deceptive “ClickFix” sites mimicking tools like Microsoft Teams to trick users into running malicious PowerShell commands. These commands install both legitimate software and hidden malware that steals data, enables remote access, and eventually launches ransomware. The group’s techniques are spreading, with others like Lazarus adopting similar methods.

  • Apr 21, 2025

    • Asia
    • Finance
    • Bangchak Corporation Public
    • South-Eastern Asia
    • Thailand

    Bangchak - Breach - 2025-04-09

    In April 2025, Bangchak, a major Thai oil and gas company, became the victim of a data breach when threat actors managed to gain access to its customer feedback system. According to Bangchak, approximately 6.5 million customer records were taken, although the initial communication to affected customers did not specify the types of data exposed, stating that no sensitive data or financial transaction information was compromised.

  • Apr 21, 2025

    • Asia
    • South-Eastern Asia
    • Business Services
    • Thailand
    • Homepro

    HomePro - Breach - 2025-04-12

    In April 2025, a threat actor announced the sale of a database belonging to homepro.co.th, a prominent household company in Thailand specializing in home appliances and decoration tools. The database reportedly contains 17,917,927 individual records, including sensitive information such as phone numbers, usernames, purchased products, addresses, gender, date of birth, and emails. The threat actor is soliciting offers for the database and has indicated that escrow services are accepted for the transaction.

  • Apr 21, 2025

    • Ingress Tool Transfer
    • Os Credential Dumping
    • Obfuscated Files Or Information
    • Data From Local System
    • Scheduled Task
    • Web Protocols
    • Drive-By Compromise
    • Time Based Evasion
    • System Information Discovery
    • Hidden Files And Directories
    • Exfiltration Over C2 Channel

    Malvertising Campaign Exploits Node.js for Data Theft

    Researchers have raised alarms about an ongoing malvertising campaign that utilizes Node.js to deliver malware aimed at information theft and data exfiltration. First detected in October 2024, the campaign employs cryptocurrency trading lures to trick users into downloading malicious installers from fraudulent websites masquerading as legitimate platforms like Binance and TradingView. The malware, once installed, harvests system information and establishes persistence through scheduled tasks and PowerShell commands, ultimately sending sensitive data to a command-and-control server. Additionally, variations of the attack have been noted, including the use of a fake PDF converter site to deploy the Sectoprat malware, which is known for stealing sensitive data.

  • Apr 21, 2025

    • United States
    • Asia
    • Canada
    • Italy
    • Brute Force
    • Africa
    • Japan
    • North America
    • Denmark
    • Northern Europe
    • Xor Ddos
    • China
    • Eastern Asia
    • Ssh
    • Southern Europe
    • Europe
    • Morocco
    • Northern Africa

    Surge in XorDDoS Trojan Attacks Targeting Docker, Linux and IoT

    Cybersecurity researchers have reported a significant increase in the prevalence of the Xorddos Trojan, a distributed denial-of-service (DDoS) malware, which has been particularly active between November 2023 and February 2025, with 71.3% of attacks targeting the United States. The malware, which has been affecting Linux systems for over a decade, has expanded its reach to Docker servers and is primarily delivered through SSH brute-force attacks. A new version of the malware's sub-controller has been observed, suggesting that it is being marketed for sale by Chinese-speaking operators. Nearly 42% of compromised devices are located in the U.S., followed by Japan, Canada, Denmark, Italy, Morocco, and China.

  • Apr 20, 2025

    • Wineloader
    • Grapeloader
    • Phishing
    • Europe
    • Apt29

    APT29's Phishing Campaign Targets European Diplomats with Grapeloader

    APT29, a Russian state-sponsored threat actor, is linked to a sophisticated phishing campaign targeting diplomatic entities in Europe using a new variant of Wineloader and a previously unreported malware loader named Grapeloader. The campaign exploits wine-tasting event invitations to trick recipients into downloading a malware-laden zip file, which deploys Grapeloader to collect information and facilitate further attacks. Grapeloader enhances the stealth and anti-analysis capabilities of Wineloader, indicating a significant evolution in the tactics employed by APT29. The campaign primarily focuses on ministries of foreign affairs across multiple European countries, with indications of targeting diplomats in the Middle East as well.

  • Apr 16, 2025

    • Finance
    • United States
    • North America
    • Lemonade Insurance Agency

    Lemonade Insurance Reports Data Leak Involving Driver License Numbers

    Lemonade Insurance has disclosed a potential data leak caused by a technical issue/vulnerability in a third-party vendor’s non-encrypted API. The incident may have exposed customer driver's license numbers. While no misuse has been reported so far, the exposure of this sensitive identifier raises concerns about identity theft risks, especially when combined with other personal data.

  • Apr 16, 2025

    • Ingress Tool Transfer
    • Reflective Code Loading
    • Rundll32
    • Web Protocols
    • India
    • Dns
    • Malicious File
    • Phishing
    • System Checks
    • Shared Modules
    • Software Packing
    • Shortcut Modification
    • Spearphishing Link
    • Exfiltration Over Alternative Protocol
    • Visual Basic
    • Southern Europe
    • South-Eastern Asia
    • Middle East
    • Dll Side-Loading
    • Europe
    • Scripting
    • Indonesia
    • Healthcare
    • Disable Or Modify Tools
    • Obfuscated Files Or Information
    • Czech Republic
    • Italy
    • Southern Asia
    • Latin America And The Caribbean
    • Junk Data
    • Deobfuscate/Decode Files Or Information
    • Scheduled Task
    • Portugal
    • Exploitation For Defense Evasion
    • Resolverrat
    • Spearphishing Attachment
    • Asia
    • Asymmetric Cryptography
    • Protocol Impersonation
    • Security Software Discovery
    • Digital Certificates
    • Debugger Evasion
    • Brazil
    • Exfiltration Over C2 Channel
    • Registry Run Keys / Startup Folder
    • Turkey

    ResolverRat: A New Threat to Healthcare Cybersecurity

    Cybersecurity researchers have identified a sophisticated remote access trojan named ResolverRat, which is targeting the healthcare and pharmaceutical sectors through fear-based phishing emails. The campaign, observed as recently as March 2025, employs localized phishing lures in various languages to increase infection rates. ResolverRat utilizes advanced techniques such as DLL side-loading, multi-stage bootstrapping, and certificate-based authentication to establish persistent connections with command-and-control servers while evading detection. The malware's goal is to execute commands from the C2 server and exfiltrate data in small chunks to minimize detection risks.

  • Apr 16, 2025

    • Government
    • Xenorat
    • Asia
    • Sparkrat
    • Curlback Rat
    • Southern Asia
    • Energy
    • Critical Infrastructures
    • India
    • Sidecopy
    • Transportation
    • Railroad Transportation

    Pakistani Threat Actor Expands Targeting in India with New Malware Techniques

    A threat actor linked to Pakistan has been observed targeting various sectors in India, including the railway, oil and gas, and external affairs ministries, using multiple remote access trojans such as Xeno RAT, Spark RAT, and a new malware called Curlback RAT. This activity, detected by Seqrite in December 2024, marks a significant expansion beyond previous targets like government and defense sectors. The group has shifted its tactics from using HTML application files to Microsoft Installer packages for malware deployment and employs sophisticated techniques like DLL side-loading and credential phishing to enhance persistence and evade detection.

  • Apr 14, 2025

    • Middle East
    • Banyuwangixploit
    • Israel
    • Asia

    Threat Actor Claims Leak of 2GB of Data Belonging to Israeli Entities

    On April 10th, 2025, the threat actor named "BanyuwangiXploit" claimed to have a dataset belonging to Israeli entities. According to the threat actor, over 2GB of data were taken and shared on a darknet forum. The data seems to include email addresses, along with private communications.

  • Apr 14, 2025

    • Government
    • Energy
    • Media
    • Construction
    • Russia
    • Paper Werewolf
    • Eastern Europe
    • Telecommunications
    • Europe
    • Powermodul

    New Cyber Attacks by Paper Werewolf Targeting Russian Entities

    The threat actor known as Paper Werewolf, also referred to as Goffee, has been actively targeting Russian organizations across various sectors, including mass media, telecommunications, construction, government, and energy, with a new implant called Powermodul. Between July and December 2024, Kaspersky reported that Paper Werewolf conducted at least seven campaigns, utilizing phishing emails with macro-laden documents to deploy a PowerShell-based remote access trojan named Powerrat. The attacks often involve a multi-stage infection process, leveraging malicious RAR archives and executable files disguised as documents. The Powermodul backdoor, introduced in early 2024, has been used to download additional payloads like Powertaskel and Flashfilegrabber, which facilitate data exfiltration and further compromise of targeted systems.

  • Apr 14, 2025

    • Akirabot

    AkiraBot: AI-Powered Spam Campaign Targeting Websites

    Cybersecurity researchers have uncovered a new AI-powered bot named AkiraBot, which has been actively spamming over 400,000 websites since September 2024. This bot utilizes OpenAI's language models to generate tailored spam messages that bypass traditional spam filters and CAPTCHA protections. Initially known as ShopBot, AkiraBot targets contact forms and chat widgets on small to medium-sized business websites, leveraging a user-friendly interface for mass targeting. The bot's sophisticated design allows it to mimic legitimate user behavior and evade detection, raising concerns about the challenges AI poses in combating spam attacks. In response to these findings, OpenAI has disabled the API key used by the bot's operators.

  • Apr 10, 2025

    • Energy
    • Spain
    • Southern Europe
    • Endesa S.A
    • Europe
    • Donalddump

    Endesa ENERGIA XXI- Breach - 2025-04-05

    The threat actor known as DonaldDump claims to have breached Spanish utilities company Energía XXI and is selling a database containing 4,015,311 records for 7500$. According to the post, the compromised data includes national ID numbers (DNI), full names, phone numbers, addresses, email addresses, IBANs, and utility identifiers (LUZCUPS or GASCUPS). All records include bank account details (IBANs).

  • Apr 10, 2025

    • Asia
    • Access Israel
    • Israel
    • Network Denial Of Service
    • Ruskinet
    • Middle East
    • Education

    RuskiNet Takes Down Access Israel Website in Geopolitical Cyber Attack

    The Access Israel website, focused on Israeli security research, was taken down by RuskiNet. This attack disrupts access to critical research on Israeli defense strategies, aligning with the ongoing #OpIsrael campaign.

  • Apr 10, 2025

    • United States
    • Satanic
    • North America
    • Magento
    • Business Services

    Threat Actor Satanic Leaks Magento CRM Data of 745,000 Users

    On April 9th, 2025, the threat actor known as "Satanic" leaked data allegedly stolen from a third-party vendor of Magento. According to the threat actor, over 740 thousand user records were taken, including 430,000 emails and 261,000 phone numbers linked to major global companies—posing serious phishing and fraud risks.

  • Apr 10, 2025

    • Asia
    • Southern Asia
    • Telecommunications
    • Mobile Communication Company Of Iran
    • Shadowbits
    • Islamic Republic Of Iran

    Threat Actors Claim Breach of Iran's Biggest Telecommunications Company

    In April 2025, the threat actor group named Shadowbits claimed to have breached Hamrahe Avval (MCI), Iran's largest mobile operator, and to have gained access to its database. According to the threat actor, a substantial amount of data belonging to MCI's customers was taken, including full names, father names, place of birth, gender, national ID numbers, addresses, postal codes, birth dates, mobile numbers, and SIM card information.

  • Apr 10, 2025

    • Software
    • Pipemagic
    • Cve-2025-29824
    • North America
    • Technology
    • CVE-2025-29824
    • Europe
    • Middle East
    • Business Services
    • Venezuela
    • Storm-2460
    • Southern Europe
    • United States
    • Latin America And The Caribbean
    • Finance
    • Real Estate
    • Saudi Arabia
    • Retail
    • Asia
    • Spain

    Exploitation of Windows Zero-Day Leads to Ransomware Attacks

    Microsoft has disclosed that a recently patched zero-day vulnerability in the Windows Common Log File System (CLFS), identified as CVE-2025-29824, was exploited in targeted ransomware attacks against organizations in various sectors including IT, real estate, finance, and retail across the United States, Venezuela, Spain, and Saudi Arabia. The attacks utilized a malware named 'pipemagic' to deliver the exploit and ransomware payloads, with the initial access vector still under investigation. This vulnerability allows for privilege escalation, enabling threat actors to gain system privileges and deploy ransomware effectively within compromised environments.

Ready to
experience hyper-relevance?

See Argos Edge in action!

Schedule a demo

Uncover your compromised credentials from the deep and dark web

Fill in your business email to start