Now Dyre could be going after Salesforce credentials, possibly to enable theft of databases or to further spread the malware through a known source, Tomer Weingarten, CEO of SentinelOne, told SCMagazine.com on Monday, adding that Dyre can be repurposed to go after any type of credentials.
Like this article? Follow us on LinkedIn, Twitter, YouTube or Facebook to see the content we post.
Read more about Cyber Security
- Turning the Tables on “Rombertik” Reveals the Story Behind the Threat
- SharePoint ToolShell | Zero-Day Exploited in-the-Wild Targets Enterprise Servers
- Caught in the CAPTCHA: How ClickFix is Weaponizing Verification Fatigue to Deliver RATs & Infostealers
- macOS.ZuRu Resurfaces | Modified Khepri C2 Hides Inside Doctored Termius App
- Katz Stealer | Powerful MaaS On the Prowl for Credentials and Crypto Assets
- FortiGate Edge Intrusions | Stolen Service Accounts Lead to Rogue Workstations and Deep AD Compromise