Say Hi to HelloTDS: The Infrastructure Behind FakeCaptcha

Key PointsGen Threat Labs uncovered a sophisticated Traffic Direction System called HelloTDS that selectively delivers FakeCaptcha, tech scams, and malware via infected streaming and file-sharing sites. The campaign employs advanced fingerprinting techniques and domain rotation to evade detection and target victims based on geolocation, IP address, and browser attributes. #HelloTDS #FakeCaptcha #LummaC2

Read More
Operation DRAGONCLONE: Chinese Telecommunication industry targeted via VELETRIX & VShell malware

A sophisticated cyber campaign named Operation DRAGONCLONE targeted China Mobile Tietong using VELETRIX and VShell malware, employing DLL sideloading, anti-sandbox, and IPfuscation techniques. The activity is linked to China-aligned threat groups UNC5174 and Earth Lamia, with overlaps to multiple post-exploitation tools and infrastructure. #OperationDRAGONCLONE #VELETRIX #VShell #ChinaMobileTietong #UNC5174 #EarthLamia

Read More
BladedFeline: Whispering in the dark

In 2024, ESET researchers identified BladedFeline, an Iran-aligned APT group active since 2017, targeting Kurdish and Iraqi government officials with advanced malware including the Whisper backdoor and PrimeCache IIS module. The group is assessed as a subgroup of OilRig, utilizing sophisticated tools and maintaining long-term access for cyberespionage purposes. #BladedFeline #Whisper #PrimeCache #OilRig

Read More