Data Exfiltration Archives - GBHackers Security | #1 Globally Trusted Cyber Security News Platform https://gbhackers.com/tag/data-exfiltration/ GBhackers Offering Exclusive Cyber Security News Coverage, New Research papers & Technology Updates. Mon, 04 Nov 2024 13:08:32 +0000 en-US hourly 1 https://wordpress.org/?v=6.6.2 https://gbhackers.com/wp-content/uploads/2024/09/cropped-gbh-32x32.png Data Exfiltration Archives - GBHackers Security | #1 Globally Trusted Cyber Security News Platform https://gbhackers.com/tag/data-exfiltration/ 32 32 Evasive Panda Attacking Cloud Services To Steal Data Using New Toolkit https://gbhackers.com/evasive-panda-cloudscout-attack/ https://gbhackers.com/evasive-panda-cloudscout-attack/#respond Mon, 04 Nov 2024 13:08:31 +0000 https://gbhackers.com/?p=114319 The Evasive Panda group deployed a new C# framework named CloudScout to target a Taiwanese government entity in early 2023, which leverages three modules, CGM, CGN, and COL, to hijack web sessions and access cloud services like Google Drive, Gmail, and Outlook.  By stealing cookies from a victim’s browser, CloudScout can bypass 2FA and IP […]

The post Evasive Panda Attacking Cloud Services To Steal Data Using New Toolkit appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

The post Evasive Panda Attacking Cloud Services To Steal Data Using New Toolkit appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

]]>
https://gbhackers.com/evasive-panda-cloudscout-attack/feed/ 0
Researchers Details Attacks On Air-Gaps Computers To Steal Data https://gbhackers.com/air-gap-attacks-data-theft/ https://gbhackers.com/air-gap-attacks-data-theft/#respond Tue, 10 Sep 2024 10:31:14 +0000 https://gbhackers.com/?p=110793 The air-gap data protection method isolates local networks from the internet to mitigate cyber threats and protect sensitive data, which is commonly used by organizations dealing with confidential information such as personal, financial, medical, legal, and biometric data.  By eliminating internet connectivity, air-gap networks provide a high level of security against external attacks, ensuring compliance […]

The post Researchers Details Attacks On Air-Gaps Computers To Steal Data appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

The post Researchers Details Attacks On Air-Gaps Computers To Steal Data appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

]]>
https://gbhackers.com/air-gap-attacks-data-theft/feed/ 0
Earth Baku Using Customized Tools To Maintain Persistence And Steal Data https://gbhackers.com/earth-baku-custom-tools-data-theft/ https://gbhackers.com/earth-baku-custom-tools-data-theft/#respond Wed, 14 Aug 2024 12:08:34 +0000 https://gbhackers.com/?p=95697 Earth Baku, an APT actor who initially focused on the Indo-Pacific region, has grown its activities extensively since late 2022. The group has increased its presence in Europe, the Middle East, and Africa (MEA), having also confirmed engagements in Italy, Germany, UAE and Qatar. Cybersecurity researchers at Trend Micro recently discovered that Earth Baku has […]

The post Earth Baku Using Customized Tools To Maintain Persistence And Steal Data appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

The post Earth Baku Using Customized Tools To Maintain Persistence And Steal Data appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

]]>
https://gbhackers.com/earth-baku-custom-tools-data-theft/feed/ 0
Hackers Attacking Vaults, Buckets, And Secrets To Steal Data https://gbhackers.com/hackers-attacking-vaults-buckets-secrets/ https://gbhackers.com/hackers-attacking-vaults-buckets-secrets/#respond Fri, 21 Jun 2024 07:58:37 +0000 https://gbhackers.com/?p=92196 Hackers target vaults, buckets, and secrets to access some of the most classified and valuable information, including API keys, logins, and other useful data kept within these storage solutions. These storage solutions’ centralized and often inadequately protected nature makes them exceptional targets for the threat actors. Cybersecurity analysts at DATADOG Security Labs discovered that hackers […]

The post Hackers Attacking Vaults, Buckets, And Secrets To Steal Data appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

The post Hackers Attacking Vaults, Buckets, And Secrets To Steal Data appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

]]>
https://gbhackers.com/hackers-attacking-vaults-buckets-secrets/feed/ 0
Critical Flaw In Apple Ecosystems Let Attackers Gain Unauthorized Access https://gbhackers.com/critical-flaw-apple-ecosystems/ https://gbhackers.com/critical-flaw-apple-ecosystems/#respond Wed, 12 Jun 2024 15:22:11 +0000 https://gbhackers.com/?p=91676 Hackers go for Apple due to its massive user base along with rich customers, including business people and managers who use those devices with some important information. Even with these security measures in place, Apple is a likely target since there will always be risks and the opportunity to obtain valuable information that lures the […]

The post Critical Flaw In Apple Ecosystems Let Attackers Gain Unauthorized Access appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

The post Critical Flaw In Apple Ecosystems Let Attackers Gain Unauthorized Access appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

]]>
https://gbhackers.com/critical-flaw-apple-ecosystems/feed/ 0
ALPHV Ransomware Deployment Started With RDP Access And ScreenConnect Installations https://gbhackers.com/alphv-ransomware-rdp-screenconnect-deployment/ https://gbhackers.com/alphv-ransomware-rdp-screenconnect-deployment/#respond Mon, 10 Jun 2024 09:33:11 +0000 https://gbhackers.com/?p=91546 Ransomware is used by hackers to abuse victims’ data, locking it until a ransom is paid. This method of cyber attack is profitable as it takes advantage of data’s proximity and vitality to individuals and companies, so they have no choice but to pay for quick returns. An invasion started with an email containing a […]

The post ALPHV Ransomware Deployment Started With RDP Access And ScreenConnect Installations appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

The post ALPHV Ransomware Deployment Started With RDP Access And ScreenConnect Installations appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

]]>
https://gbhackers.com/alphv-ransomware-rdp-screenconnect-deployment/feed/ 0
Hackers Abuse QEMU Hardware Emulator for Stealthy C2 Communication https://gbhackers.com/hackers-qemu-data-exfiltration/ https://gbhackers.com/hackers-qemu-data-exfiltration/#respond Wed, 06 Mar 2024 10:39:25 +0000 https://gbhackers.com/?p=84541 QEMU is an open-source platform that provides a secure and private virtualized space for trying out malicious codes, exploits, and attacks on their own environments.  ⁤This controlled testing ground minimizes the risk of detection and legal matters. ⁤⁤ Moreover, QEMU permits hackers to develop malware that can run across different hardware architectures and operating systems. […]

The post Hackers Abuse QEMU Hardware Emulator for Stealthy C2 Communication appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

The post Hackers Abuse QEMU Hardware Emulator for Stealthy C2 Communication appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

]]>
https://gbhackers.com/hackers-qemu-data-exfiltration/feed/ 0
Researchers Uncover Tools And Tactics Used By Chinese Hackers https://gbhackers.com/chinese-hackers-tools-tactics/ https://gbhackers.com/chinese-hackers-tools-tactics/#respond Wed, 28 Feb 2024 14:13:00 +0000 https://gbhackers.com/?p=84099 Over the years, several reports associated with cybercriminals have been based in Russia and Western countries. This is due to the fact that many sophisticated cyber attacks and data leaks originate from these regions. Though this is the case, there has been major blindness towards the growing threat actor community from China. The Chinese underground […]

The post Researchers Uncover Tools And Tactics Used By Chinese Hackers appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

The post Researchers Uncover Tools And Tactics Used By Chinese Hackers appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

]]>
https://gbhackers.com/chinese-hackers-tools-tactics/feed/ 0