Op Digital Eye Ftr
labs

Operation Digital Eye | Chinese APT Compromises Critical Digital Infrastructure via Visual Studio Code Tunnels

Aleksandar Milenkoski & Luigi Martire (Tinexta Cyber) /

Threat actors abused Visual Studio Code and Microsoft Azure infrastructure to target large business-to-business IT service providers in Southern Europe.

Read More
Doppelganger Russia Aligned Influence Operation Targets Germany 2
labs

Doppelgänger | Russia-Aligned Influence Operation Targets Germany 

Doppelgänger, a sophisticated Russia-aligned operation, targets German public opinion with disinformation ahead of elections.

Read More
A Glimpse Into Future ScarCruft Campaigns Attackers Gather Strategic Intelligence And Target Cybersecurity Professionals 20
labs

ScarCruft | Attackers Gather Strategic Intelligence and Target Cybersecurity Professionals

New ScarCruft activity suggests the adversary is planning to target cybersecurity professionals and businesses.

Read More
Gaza Cybergang Unified Front Targeting Hamas Opposition 13
labs

Gaza Cybergang | Unified Front Targeting Hamas Opposition

Cluster of threat groups continues on trajectory to consolidate with shared victims, TTPs and evolving malware.

Read More
Sandman APT China Based Adversaries Embrace Lua 19
labs

Sandman APT | China-Based Adversaries Embrace Lua

SentinelLabs, Microsoft, and PwC threat intelligence researchers provide attribution-relevant information on the Sandman APT cluster.

Read More
Sandman APT A Mystery Group Targeting Telcos With A LuaJIT Toolkit 4
labs

Sandman APT | A Mystery Group Targeting Telcos with a LuaJIT Toolkit

Sophisticated threat actor deploys high-end malware utilizing the LuaJIT platform to backdoor telcos in Europe, Middle East and South Asia.

Read More
Chinese Entanglement DLL Hijacking In The Asian Gambling Sector By Aleksandar Milenkoski And Tom Hegel 5
labs

Chinese Entanglement | DLL Hijacking in the Asian Gambling Sector

Threat actors abuse Adobe Creative Cloud, Edge, and other executables vulnerable to DLL hijacking in campaign targeting the Southeast Asian gambling sector.

Read More
Kimsuky Strikes Again New Social Engineering Campaign Aims To Steal Credentials And Gather Strategic Intelligence 5
labs

Kimsuky Strikes Again | New Social Engineering Campaign Aims to Steal Credentials and Gather Strategic Intelligence

Threat actor targets experts in North Korean affairs with spoofed URLs and weaponized Office documents to steal Google and other credentials.

Read More
Operation Magalenha Long Running Campaign Pursues Portuguese Credentials And PII 3
labs

Operation Magalenha | Long-Running Campaign Pursues Portuguese Credentials and PII

A Brazilian threat actor is targeting users of over 30 Portuguese financial institutions with custom backdoors.

Read More
Kimsuky Ongoing Campaign Using Tailored Reconnaissance Toolkit 1
labs

Kimsuky | Ongoing Campaign Using Tailored Reconnaissance Toolkit

North Korean APT group focuses on file reconnaissance and information exfiltration with latest variant of RandomQuery malware.

Read More