Now Dyre could be going after Salesforce credentials, possibly to enable theft of databases or to further spread the malware through a known source, Tomer Weingarten, CEO of SentinelOne, told SCMagazine.com on Monday, adding that Dyre can be repurposed to go after any type of credentials.
Read more about Cyber Security
- Turning the Tables on “Rombertik” Reveals the Story Behind the Threat
- In-the-Wild WPAD Attack | How Threat Actors Abused Flawed Protocol For Years
- Threat Actor UAC-0056 Targeting Ukraine with Fake Translation Software
- From the Front Lines | Hive Ransomware Deploys Novel IPfuscation Technique To Avoid Detection
- Is SquirrelWaffle the New Emotet? How to Detect the Latest MalSpam Loader
- Living Off Windows Defender | LockBit Ransomware Sideloads Cobalt Strike Through Microsoft Security Tool