Ukrainian entities based in Finland have been targeted as part of a malicious campaign distributing a commercial remote access trojan known as Remcos RAT using a malware loader called IDAT Loader.
Read MoreThe threat actor tracked as UAC-0184 has been using steganography techniques to deliver the Remcos remote access Trojan (RAT) via a relatively new malware known as the IDAT Loader, to a Ukrainian target based in Finland.
Read MoreUAC-0184's latest activity, which started in early January 2024 and was spotted by Morphisec analysts, illustrates that they have expanded to target organizations outside of Ukraine that are affiliated with their strategic target.
Read MoreThe UAC-0184 group targets Ukrainian military personnel, including those outside the country, and uses steganography to infect their devices with a remote access trojan.
Read More63 moons Technology has partnered with global leading cybersecurity firms, including Blackberry, Resecurity, and Morphisec, to create the best-in-class and comprehensive cybersecurity suite.
Read MoreSignificant enhancements to bolster stealth have been added to the latest variant of the Chaes malware identified as "Chae$ 4.1," Hackread reports.
Read MoreCybersecurity researchers have discovered a new Java-based "sophisticated" information stealer that uses a Discord bot to exfiltrate sensitive data from compromised hosts.
Read MoreThe latest Chae$ 4.1 sends a direct message to the cybersecurity researchers at Morphisec within the source code.
Read MoreAnalysis of the infostealer malware version 4.1 includes hidden ASCII art and a shout-out thanking Morphisec researchers.
Read MoreIn a report published on Thursday (1/11), security shop Recorded Future warns that GitHub's infrastructure is frequently abused by criminals to support and deliver malware.
Read More