Advertisement · 728 × 90
#
Hashtag
#cybertheft
Advertisement · 728 × 90
Preview
WebRAT Malware Spreads Through Fake GitHub Exploit Repositories  The WebRAT malware is being distributed through GitHub repositories that falsely claim to host proof-of-concept exploits for recently disclosed security vulnerabilities. This marks a shift in the malware’s delivery strategy, as earlier campaigns relied on pirated software and cheats for popular games such as Roblox, Counter-Strike, and Rust. First identified at the beginning of the year, WebRAT operates as a backdoor that allows attackers to gain unauthorized access to infected systems and steal sensitive information, while also monitoring user activity.  A report published by cybersecurity firm Solar 4RAYS in May detailed the scope of WebRAT’s capabilities. According to the findings, the malware can harvest login credentials for platforms including Steam, Discord, and Telegram, along with extracting data from cryptocurrency wallets. Beyond credential theft, WebRAT poses a serious privacy threat by enabling attackers to activate webcams and capture screenshots, exposing victims to covert surveillance.  Since at least September, the threat actors behind WebRAT have expanded their tactics by creating GitHub repositories designed to appear legitimate. These repositories present themselves as exploit code for high-profile vulnerabilities that have received widespread media attention. Among the issues referenced are a Windows flaw that allows remote code execution, a critical authentication bypass in the OwnID Passwordless Login plugin for WordPress, and a Windows privilege escalation vulnerability that enables attackers to gain elevated system access. By exploiting public awareness of these vulnerabilities, the attackers increase the likelihood that developers and security researchers will trust and download the malicious files.  Security researchers at Kaspersky identified 15 GitHub repositories linked to the WebRAT campaign. Each repository contained detailed descriptions of the vulnerability, explanations of the supposed exploit behavior, and guidance on mitigation. Based on the structure and writing style of the content, Kaspersky assessed that much of the material was likely generated using artificial intelligence tools, adding to the appearance of legitimacy. The fake exploits are distributed as password-protected ZIP archives containing a mix of decoy and malicious components.  These include empty files, corrupted DLLs intended to mislead analysis, batch scripts that form part of the execution chain, and a dropper executable named rasmanesc.exe. Once launched, the dropper elevates system privileges, disables Windows Defender, and downloads the WebRAT payload from a hardcoded remote server, enabling full compromise of the system.   Kaspersky noted that the WebRAT variant used in this campaign does not introduce new features and closely resembles previously documented samples. Although all identified malicious repositories have been removed from GitHub, researchers warn that similar lures could resurface under different names or accounts.  Security experts continue to advise that exploit code from unverified sources should only be tested in isolated, controlled environments to reduce the risk of infection.

WebRAT Malware Spreads Through Fake GitHub Exploit Repositories #CyberAttacks #cybertheft #datasecurity

0 0 0 0
Post image

Gift Card & Loyalty Points Scams Alert!

Cybercriminals are draining digital gifts! Don't let your balances become hacker loot.

Protect Your Value: 🔹 Use Unique Passwords + MFA. 🔹 Monitor account activity frequently.

#HolidaySecurity #GiftCardScams #CyberTheft

0 0 0 0
Preview
North Korea Has Stolen Billions in Cryptocurrency and Tech Firm Salaries, Report Says The Associated Press reports that

North Korea Has Stolen Billions in Cryptocurrency and Tech Firm Salaries, Report Says #Technology #Cybersecurity #NorthKorea #Cryptocurrency #CyberTheft

0 0 0 0
Steam Games Are LITTERALLY Robbing People Now!?
Steam Games Are LITTERALLY Robbing People Now!? YouTube video by CyberFlow

Many people use this platform it’s extremely common.
This is of course, not the first, but I hope it is the final wake up. Call necessary for Steam to start vetting a little more.
#Gaming #cybertheft #Hacks #Steam #steampowered #mmorpg #gamers

youtu.be/MGXWcSMNcLA?...

0 0 0 0
Original post on hachyderm.io

"Police told the Associated Press the hackers stole more than 540 million Brazilian reais (more than $98.3 million) from at least one financial institution but likely took more from other banks and lenders. TV Globo said at least six financial institutions were impacted.
On Telegram, prominent […]

0 0 0 0
Preview
BRUCE MacKINNON CARTOON: Nova Scotia Power airs your SIN-full laundry The president of Nova Scotia Power offered repeated apologies, but no explanation for the recent cybertheft of personal customer information

www.saltwire.com/nova-scotia/...
#privacy #cybertheft #CyberSecurity #CreditTheft #PublicTrust @novascotiapower.bsky.social #Emera

6 0 0 0
It's also more efficient than previous regime scams, such as exporting crystal meth and getting embassies to use their diplomatic immunity for smuggling. In 2023, a UN monitoring body reported that cyber-theft accounted for half of the state's total foreign-currency revenue. The majority of the proceeds are thought to be spent on its weapons programme.
Today, North Korea's cyber-army is thought to be more than 8,000-strong, most of them talented maths students cherry-picked from school. Within North Korea, they operate within the innocuous-sounding Reconnaissance General Bureau, although when in action, their cyber noms de guerre include Lazarus, BeagleBoyz, Hidden Cobra, and APT38. (the "APT" stands for "advanced persistent threat.")

It's also more efficient than previous regime scams, such as exporting crystal meth and getting embassies to use their diplomatic immunity for smuggling. In 2023, a UN monitoring body reported that cyber-theft accounted for half of the state's total foreign-currency revenue. The majority of the proceeds are thought to be spent on its weapons programme. Today, North Korea's cyber-army is thought to be more than 8,000-strong, most of them talented maths students cherry-picked from school. Within North Korea, they operate within the innocuous-sounding Reconnaissance General Bureau, although when in action, their cyber noms de guerre include Lazarus, BeagleBoyz, Hidden Cobra, and APT38. (the "APT" stands for "advanced persistent threat.")

Bybit hack eclipses previous heists
Funds stolen by North Korean cyber criminals

Bybit hack eclipses previous heists Funds stolen by North Korean cyber criminals

North Korean hackers account for the vast majority of crypto theft
Percentage of industrywide, cryptocurrency theft losses

North Korean hackers account for the vast majority of crypto theft Percentage of industrywide, cryptocurrency theft losses

Post image

What began as an instrument for self-preservation has increasingly become one for self-enrichment. With North Korea economy on its knees because of sanctions on its nuclear weapons program, Lazarus’s ill-gotten gains are now a vital source of revenue. archive.ph/mOPsO #hacking #cybertheft

0 0 0 0

#Cybertheft Sid.

1 0 0 0
FACTOR’s Response to the Scotiabank Cybertheft: The Facts

This is shocking. FACTOR’s Response to the Scotiabank #Cybertheft: The Facts - #FACTOR Canada www.factor.ca/factors-resp...

2 0 0 0