Now Dyre could be going after Salesforce credentials, possibly to enable theft of databases or to further spread the malware through a known source, Tomer Weingarten, CEO of SentinelOne, told SCMagazine.com on Monday, adding that Dyre can be repurposed to go after any type of credentials.
Like this article? Follow us on LinkedIn, Twitter, YouTube or Facebook to see the content we post.
Read more about Cyber Security
- Turning the Tables on “Rombertik” Reveals the Story Behind the Threat
- Ikaruz Red Team | Hacktivist Group Leverages Ransomware for Attention Not Profit
- 2024 macOS Malware Review | Infostealers, Backdoors, and APT Campaigns Targeting the Enterprise
- The State of Cloud Ransomware in 2024
- macOS NotLockBit | Evolving Ransomware Samples Suggest a Threat Actor Sharpening Its Tools
- HellCat and Morpheus | Two Brands, One Payload as Ransomware Affiliates Drop Identical Code