Understanding CYBEREYE RAT Builder: Capabilities and Implications

CyberEye, also known as TelegramRAT, is a modular .NET-based Remote Access Trojan that uses Telegram Bot API for command and control, enabling stealthy surveillance and data theft without requiring attacker infrastructure. Its capabilities include credential harvesting, defense evasion by disabling Windows Defender, clipboard hijacking, and persistence via scheduled tasks, making it a significant threat for users and organizations. #CyberEye #TelegramRAT #TelegramBotAPI

Read More
Stay Ahead of Cyber Threats Sweeping Container Telemetry data

Trend Vision One™ – Threat Intelligence enhances proactive security by providing retrospective scanning and container-aware visibility to detect past and ongoing threats in diverse environments. It integrates real-time data, MITRE ATT&CK mapping, and automated investigations to enable faster, intelligence-driven incident response. #TrendVisionOne #ThreatInsights #ContainerSecurity…

Read More
Threat Analysis of the 3-Stage Combo of Kim Sooki Group

The North Korean hacking group Kimsuky has employed a sophisticated infiltration strategy targeting South Korean users via Facebook, email, and Telegram, disguising malicious files as volunteer activities for defectors. This campaign utilizes Korean-specific compressed files and encoded scripts to evade detection, with significant compromises linked to the AppleSeed malware variant. #Kimsuky #AppleSeed

Read More
Operation DRAGONCLONE: Chinese Telecommunication industry targeted via VELETRIX & VShell malware

A sophisticated cyber campaign named Operation DRAGONCLONE targeted China Mobile Tietong using VELETRIX and VShell malware, employing DLL sideloading, anti-sandbox, and IPfuscation techniques. The activity is linked to China-aligned threat groups UNC5174 and Earth Lamia, with overlaps to multiple post-exploitation tools and infrastructure. #OperationDRAGONCLONE #VELETRIX #VShell #ChinaMobileTietong #UNC5174 #EarthLamia

Read More
From open-source to open threat: Tracking Chaos RAT’s evolution

Chaos RAT is an open-source remote administration tool written in Golang that targets Windows and Linux systems, offering extensive capabilities such as file management, remote shell, and command execution. Recent analysis uncovered new variants, a critical vulnerability in its web panel enabling remote code execution, and its use in real-world attacks disguised as a Linux network troubleshooting utility. #ChaosRAT #CVE-2024-30850 #CVE-2024-31839

Read More
AMOS Variant Distributed Via Clickfix In Spectrum-Themed Dynamic Delivery Campaign By Russian Speaking Hackers

A new variant of the Atomic macOS Stealer (AMOS) campaign uses typo-squatted domains mimicking Spectrum to deliver malicious payloads targeting macOS users by harvesting system passwords. The campaign is linked to Russian-speaking cybercriminals and employs multi-platform social engineering tactics with poorly implemented logic in its delivery infrastructure. #AtomicMacOSStealer #SpectrumTyposquatting #RussianCybercriminals

Read More
Cyber Attacks on Government Agencies: Detect and Investigate with ANY.RUN for Fast Response

Government institutions worldwide are increasingly targeted by sophisticated cyberattacks, leveraging phishing emails, fraudulent domains, and malicious PDFs. ANY.RUN’s solutions provide critical tools for detecting, analyzing, and mitigating these threats, enhancing organizational cybersecurity resilience. #FormBook #ScreenConnect #SocialSecurityAdministration…

Read More