Proactive OT security: Lessons on supply chain risk management from a rogue Raspberry Pi

ClickFix is a social engineering technique exploiting end users by disguising malicious PowerShell commands as routine verification prompts, enabling threat actors to gain network access and exfiltrate data. Since March 2024, various threat actors including APT28 and MuddyWater have leveraged this method to target multiple industries globally. #ClickFix #APT28 #MuddyWater

Read More
Sora AI Clickbait Infostealer

SoraAI.lnk is an information stealer malware masquerading as OpenAI’s Sora that uses Github to download its malicious payload and exfiltrate data via Telegram. It collects extensive user information including browser data, crypto wallets, game launcher configurations, and system files, before uploading the stolen data to an external hosting site if it exceeds a certain size. #SoraAI #TelegramBot #GoFile.io

Read More
Former Black Basta Members Use Microsoft Teams and Python Scripts in 2025 Attacks

Cybercriminals tied to the Black Basta ransomware operation are evolving their tactics, using email bombing, Teams phishing, and Python scripts to gain persistent access to networks. The threat landscape is shifting as former affiliates potentially migrate to other ransomware groups like CACTUS or BlackLock, while new malware and attack strategies emerge….

Read More
APT PROFILE – MISSION2025

MISSION2025, also known as APT41, is a Chinese state-sponsored threat group active since 2012, focusing on cyberespionage and financially motivated attacks aligned with China’s strategic goals. Their recent campaigns feature sophisticated use of cloud services for command and control and exploitation of software vulnerabilities to target governments and critical infrastructure globally. #MISSION2025 #APT41 #TOUGHPROGRESS #IvantiEPMM

Read More
Gone But Not Forgotten: Black Basta’s Enduring Legacy

The ransomware group Black Basta disbanded after internal chat leaks, but its tactics, especially mass email spam and Microsoft Teams phishing, continue to be used by former members and new groups. Emerging attack methods now include Python script execution with cURL for payload delivery, emphasizing the need for strong user education and vigilant defense strategies. #BlackBasta #MicrosoftTeamsPhishing #CactusRaaS

Read More
Cybersecurity News | Daily Recap [10 Jun 2025]

Chinese-linked groups including APT41, PurpleHaze, and APT15 targeted global enterprises and infrastructure with ShadowPad and GOREshell malware, while a North Korea-linked group exploited social media for malware campaigns. Vulnerabilities in Roundcube, SAP NetWeaver, and Wazuh server were actively exploited, leading to data breaches and DDoS attacks; meanwhile, major outages impacted Heroku and OpenAI. #APT41 #ShadowPad #WazuhVulnerability #HerokuOutage

Read More
BlackSuit Continues Social Engineering Attacks in Wake of Black Basta’s Internal Conflict

The Black Basta ransomware group’s social engineering attacks sharply declined after December 2024, with evidence indicating that BlackSuit affiliates have adopted or absorbed their tactics. Rapid7’s analysis reveals sophisticated Java RAT and QEMU-based malware deployments, leveraging cloud services for command and control, and highlights ongoing evolution in attacker methods. #BlackBasta #BlackSuit #JavaRAT

Read More