WhatsApp-based malware campaign exploits VBS scripts to deploy multi-stage attacks
The campaign combines social engineering with “living-off-the-land” techniques.
2 min read
Cybersecurity Help is a global vulnerability intelligence provider. We monitor vulnerabilities in software from 60,000+ vendors and help customers prevent potential data breaches by addressing them proactively.
Request DemoThe campaign combines social engineering with “living-off-the-land” techniques.
2 min readGoogle didn’t disclose any additional details regarding the nature of exploitation.
1 min readAs part of the breach, multiple AWS access keys were stolen and later used for unauthorized activity across a limited number of Cisco cloud accounts.
2 min readAttackers leveraged the update channel of TrueConf to deliver malware, more specifically a payload linked to the Havoc C&C framework.
2 min readThe hackers hijacked the npm account of the library's developer and inserted a malicious dependency into the package configuration.
4 min read