From Trust to Threat: Hijacked Discord Invites Used for Multi-Stage Malware Delivery

Check Point Research discovered a sophisticated malware campaign exploiting expired and deleted Discord invite links to hijack users and deliver payloads like AsyncRAT and a modified Skuld Stealer targeting cryptocurrency wallets. The attackers use multi-stage loaders, trusted cloud services, and evasion techniques, including ChromeKatz, to steal data while maintaining stealth. #AsyncRAT #SkuldStealer #DiscordInviteHijacking #ChromeKatz

Read More
Cybersecurity News | Daily Recap [12 Jun 2025]

Recent cybersecurity developments include the Warlock ransomware targeting government agencies and the Fog ransomware using advanced open-source tools to evade detection. Additionally, law enforcement operations have successfully dismantled cyber scam networks and infostealer malware infrastructures, highlighting ongoing efforts to combat cyber threats. #Warlock #FogRansomware #InterpolInfostealers #AsiaScamCrackdown

Read More
Transparent Tribe DISGOMOJI Targeting Linux

APT-C-56, also known as Transparent Tribe, has been observed deploying a Golang-based ELF malware variant called DISGOMOJI that uses Google Drive and Google Cloud Platform for C2 communications and data exfiltration. The group targets Indian government and military personnel with sophisticated multi-stage attacks involving persistence mechanisms and credential theft. #APT-C-56 #DISGOMOJI #GoogleCloudPlatform

Read More
CVE-2025-26685 – Spoofing to Elevate Privileges with Microsoft Defender for Identity 

A spoofing vulnerability in the Microsoft Defender for Identity (MDI) sensor related to the Lateral Movement Paths (LMPs) feature allows an unauthenticated local network attacker to capture the Net-NTLM hash of the Directory Service Account (DSA). This vulnerability can be exploited to escalate privileges and establish a foothold in Active Directory environments, especially when combined with other security weaknesses. #CVE2025-26685 #MicrosoftDefenderForIdentity #LateralMovementPaths #DirectoryServiceAccount

Read More
Password-spraying attacks target 80,000 Microsoft Entra ID accounts

Hackers utilizing the TeamFiltration framework have targeted over 80,000 Microsoft Entra ID accounts across hundreds of organizations globally in a campaign linked to UNK_SneakyStrike. The attack involved large-scale account takeovers using AWS servers, OAuth abuse, and targeted small and large tenants. #TeamFiltration #UNK_SneakyStrike #MicrosoftEntraID #OAuth #AccountTakeover

Read More
Over 80,000 Microsoft Entra ID Accounts Targeted Using Open-Source TeamFiltration Tool

Cybersecurity researchers have identified a new account takeover campaign called UNK_SneakyStrike, which uses the open-source TeamFiltration framework to compromise Microsoft Entra ID user accounts. Over 80,000 accounts across various organizations have been affected through large-scale password spraying and account enumeration activities originating from multiple geographical locations. #TeamFiltration #AzureActiveDirectory #PasswordSpraying…

Read More
Attackers Unleash TeamFiltration: Account Takeover Campaign (UNK_SneakyStrike) Leverages Popular Pentesting Tool

Proofpoint researchers uncovered the UNKSneakyStrike campaign using the TeamFiltration framework to target Microsoft Entra ID accounts through large-scale user enumeration and password spraying. The campaign, active since December 2024, leverages AWS infrastructure and exploits native Microsoft applications for account takeover and data exfiltration. #UNKSneakyStrike #TeamFiltration #MicrosoftEntraID…

Read More
Sora AI Clickbait Infostealer

SoraAI.lnk is an information stealer malware masquerading as OpenAI’s Sora that uses Github to download its malicious payload and exfiltrate data via Telegram. It collects extensive user information including browser data, crypto wallets, game launcher configurations, and system files, before uploading the stolen data to an external hosting site if it exceeds a certain size. #SoraAI #TelegramBot #GoFile.io

Read More
APT PROFILE – MISSION2025

MISSION2025, also known as APT41, is a Chinese state-sponsored threat group active since 2012, focusing on cyberespionage and financially motivated attacks aligned with China’s strategic goals. Their recent campaigns feature sophisticated use of cloud services for command and control and exploitation of software vulnerabilities to target governments and critical infrastructure globally. #MISSION2025 #APT41 #TOUGHPROGRESS #IvantiEPMM

Read More