Threat Intelligence Archives - GBHackers Security | #1 Globally Trusted Cyber Security News Platform https://gbhackers.com/tag/threat-intelligence/ GBhackers Offering Exclusive Cyber Security News Coverage, New Research papers & Technology Updates. Tue, 05 Nov 2024 10:30:17 +0000 en-US hourly 1 https://wordpress.org/?v=6.6.2 https://gbhackers.com/wp-content/uploads/2024/09/cropped-gbh-32x32.png Threat Intelligence Archives - GBHackers Security | #1 Globally Trusted Cyber Security News Platform https://gbhackers.com/tag/threat-intelligence/ 32 32 Hackers Using AV/EDR Bypass Tool From Cybercrime Forums To Bypass Endpoints https://gbhackers.com/hackers-av-edr-bypass-cybercrime/ https://gbhackers.com/hackers-av-edr-bypass-cybercrime/#respond Tue, 05 Nov 2024 10:30:16 +0000 https://gbhackers.com/?p=114492 Researchers uncovered two previously unknown endpoints with older Cortex XDR agents that used to test an AV/EDR bypass tool were compromised, granting unauthorized access. The threat actor utilized a bypass tool, likely purchased from cybercrime forums, to compromise the system. Subsequent analysis of recovered files and digital footprints revealed the identity of one of the […]

The post Hackers Using AV/EDR Bypass Tool From Cybercrime Forums To Bypass Endpoints appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

]]>
https://gbhackers.com/hackers-av-edr-bypass-cybercrime/feed/ 0
Chinese Hackers Attacking Microsoft Customers With Sophisticated Password Spray Attacks https://gbhackers.com/chinese-password-attacks-microsoft/ https://gbhackers.com/chinese-password-attacks-microsoft/#respond Mon, 04 Nov 2024 12:34:58 +0000 https://gbhackers.com/?p=114397 Researchers have identified a network of compromised devices, CovertNetwork-1658, used by Chinese threat actors to launch highly evasive password spray attacks, successfully stealing credentials from multiple Microsoft customers.  The stolen credentials are then leveraged by threat actors like Storm-0940 to gain unauthorized access to systems. Storm-0940 has been an active threat actor since 2021 and […]

The post Chinese Hackers Attacking Microsoft Customers With Sophisticated Password Spray Attacks appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

]]>
https://gbhackers.com/chinese-password-attacks-microsoft/feed/ 0
A Massive Hacking Toolkit From “You Dun” Threat Group Developed To Lauch Massive Cyber Attack https://gbhackers.com/you-dun-hacking-toolkit-attack/ https://gbhackers.com/you-dun-hacking-toolkit-attack/#respond Mon, 04 Nov 2024 11:58:04 +0000 https://gbhackers.com/?p=114246 The “You Dun” hacking group exploited vulnerable Zhiyuan OA software using SQL injection, leveraging tools like WebLogicScan, Vulmap, and Xray for reconnaissance. They further escalated privileges on compromised hosts with tools like traitor and CDK.  Active Cobalt Strike server leaked, revealing its use in various cyberattacks, including ransomware deployment (LockBit 3) and data theft. The […]

The post A Massive Hacking Toolkit From “You Dun” Threat Group Developed To Lauch Massive Cyber Attack appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

]]>
https://gbhackers.com/you-dun-hacking-toolkit-attack/feed/ 0
TWELVE Threat Attacks Windows To Encrypt Then Deleting Victims’ Data https://gbhackers.com/twelve-windows-encrypt-delete/ https://gbhackers.com/twelve-windows-encrypt-delete/#respond Thu, 26 Sep 2024 08:48:31 +0000 https://gbhackers.com/?p=112492 The threat actor, formed in 2023, specializes in ransomware attacks targeting Russian government organizations. It encrypts and deletes victim data, exfiltrates sensitive information, and aims to inflict maximum damage on critical assets. The threat actor likely scans IP address ranges in Russia to identify VPN servers and applications accessible from the internet that could serve […]

The post TWELVE Threat Attacks Windows To Encrypt Then Deleting Victims’ Data appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

]]>
https://gbhackers.com/twelve-windows-encrypt-delete/feed/ 0
Hackers Toolkit Unveiled, Comprehensive Tools For Various Cyber Attacks https://gbhackers.com/hackers-toolkit-unveiled/ https://gbhackers.com/hackers-toolkit-unveiled/#respond Wed, 14 Aug 2024 07:57:02 +0000 https://gbhackers.com/?p=95600 Hackers always keep updating their tools and add new ones to adapt to evolving security measures, bypass defenses, and exploit newly discovered vulnerabilities.  Staying ahead of the cybersecurity advancements is completely important for them as doing so helps them maintain their ability to carry out successful cyber attacks. Cybersecurity researchers at The DFIR Report recently […]

The post Hackers Toolkit Unveiled, Comprehensive Tools For Various Cyber Attacks appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

]]>
https://gbhackers.com/hackers-toolkit-unveiled/feed/ 0
AWS Launches Mithra To Detect Malicious Domains Across Systems https://gbhackers.com/aws-mithra-malicious-domains/ https://gbhackers.com/aws-mithra-malicious-domains/#respond Wed, 07 Aug 2024 12:08:39 +0000 https://gbhackers.com/?p=95258 Amazon’s e-commerce platforms and cloud services form a digital ecosystem requiring a strong cybersecurity framework. Amazon, which has a vast online presence covering multiple domains and services, is at great risk of being attacked by advanced cyber threats. For this reason, Amazon uses an innovative mixture of the latest technologies and old security measures to […]

The post AWS Launches Mithra To Detect Malicious Domains Across Systems appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

]]>
https://gbhackers.com/aws-mithra-malicious-domains/feed/ 0
Exodus Underground Market Place Emerging As A Heaven For Cybercriminals https://gbhackers.com/exodus-marketplace-cybercriminal-haven/ https://gbhackers.com/exodus-marketplace-cybercriminal-haven/#respond Mon, 05 Aug 2024 10:55:47 +0000 https://gbhackers.com/?p=94938 The Exodus Market, a haven for exiled criminals, has grown to become a significant player in the black market economy. The user “ExodusMarket” originally announced Exodus Market for Logs on the Cracked forum on February 10, 2024, after it was formally launched at the end of January 2024. Twice, in March 2024 and July 16, […]

The post Exodus Underground Market Place Emerging As A Heaven For Cybercriminals appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

]]>
https://gbhackers.com/exodus-marketplace-cybercriminal-haven/feed/ 0
MirrorFace Attacking Organizations Exploiting Vulnerabilities In Internet-Facing Assets https://gbhackers.com/mirrorface-attacks-exploiting-vulnerabilities/ https://gbhackers.com/mirrorface-attacks-exploiting-vulnerabilities/#respond Tue, 16 Jul 2024 12:39:13 +0000 https://gbhackers.com/?p=93692 MirrorFace threat actors have been targeting media, political organizations, and academic institutions since 2022, shifting focus to manufacturers and research institutions in 2023.  The attack method evolved from spear phishing to exploiting vulnerabilities in external assets, specifically in Array AG and FortiGate products, while the actors deploy NOOPDOOR malware and use various tools to exfiltrate […]

The post MirrorFace Attacking Organizations Exploiting Vulnerabilities In Internet-Facing Assets appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

]]>
https://gbhackers.com/mirrorface-attacks-exploiting-vulnerabilities/feed/ 0
Chinese Winnti Group Intensifies Financially Motivated Attacks https://gbhackers.com/chinese-winnti-group-financial-attacks/ https://gbhackers.com/chinese-winnti-group-financial-attacks/#respond Sun, 23 Jun 2024 01:15:25 +0000 https://gbhackers.com/?p=92279 Hackers are increasingly executing financially motivated attacks and all due to the lucrative potential of monetizing the stolen data, ransoms, and fraudulent activities. The digital revolution of businesses has invented more openings to exploit financial transactions and access sensitive financial information. AttackIQ recently unveiled that the Chinese Winnti group intensifies financially motivated attacks. Winnti is […]

The post Chinese Winnti Group Intensifies Financially Motivated Attacks appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

]]>
https://gbhackers.com/chinese-winnti-group-financial-attacks/feed/ 0
Most Important Endpoint Security & Threat Intelligence Tools List for Hackers and Security Professionals https://gbhackers.com/threat-intelligence-tools/ https://gbhackers.com/threat-intelligence-tools/#respond Thu, 20 Jul 2023 01:26:00 +0000 https://gbhackers.com/?p=16119 Threat Intelligence and endpoint Security Tools are more often used by security industries to test the vulnerabilities in networks and applications. Here you can find the Comprehensive Endpoint Security list that covers Performing Penetration testing Operations in all Corporate Environments. Endpoint security and threat intelligence tools are vital for both ethical hackers (often termed “white–hat” […]

The post Most Important Endpoint Security & Threat Intelligence Tools List for Hackers and Security Professionals appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

]]>
https://gbhackers.com/threat-intelligence-tools/feed/ 0