JSFireTruck: Exploring Malicious JavaScript Using JSF*ck as an Obfuscation Technique

A large-scale campaign is compromising legitimate websites by injecting obfuscated JavaScript using the JSFireTruck technique, redirecting users from search engines to malicious pages that deliver malware and unwanted content. The campaign affects hundreds of thousands of webpages and employs type coercion-based obfuscation, making detection and analysis challenging. #JSFireTruck #Unit42 #VirusTotal…

Read More
Former Black Basta Members Use Microsoft Teams and Python Scripts in 2025 Attacks

Cybercriminals tied to the Black Basta ransomware operation are evolving their tactics, using email bombing, Teams phishing, and Python scripts to gain persistent access to networks. The threat landscape is shifting as former affiliates potentially migrate to other ransomware groups like CACTUS or BlackLock, while new malware and attack strategies emerge….

Read More
Gone But Not Forgotten: Black Basta’s Enduring Legacy

The ransomware group Black Basta disbanded after internal chat leaks, but its tactics, especially mass email spam and Microsoft Teams phishing, continue to be used by former members and new groups. Emerging attack methods now include Python script execution with cURL for payload delivery, emphasizing the need for strong user education and vigilant defense strategies. #BlackBasta #MicrosoftTeamsPhishing #CactusRaaS

Read More
BlackSuit Continues Social Engineering Attacks in Wake of Black Basta’s Internal Conflict

The Black Basta ransomware group’s social engineering attacks sharply declined after December 2024, with evidence indicating that BlackSuit affiliates have adopted or absorbed their tactics. Rapid7’s analysis reveals sophisticated Java RAT and QEMU-based malware deployments, leveraging cloud services for command and control, and highlights ongoing evolution in attacker methods. #BlackBasta #BlackSuit #JavaRAT

Read More
OpenAI Bans ChatGPT Accounts Used by Russian, Iranian, and Chinese Hacker Groups

OpenAI announced the shutdown of ChatGPT accounts linked to Russian-speaking threat actors and Chinese nation-state hacking groups, exploiting AI for malware development, social media automation, research, and cyber campaigns. These groups used the models for developing malware, bypassing security, and executing disinformation and espionage activities. #ScopeCreep #UNC2630 #APT15 #CyberThreatActors…

Read More
PyPI Package Disguised as Instagram Growth Tool Harvests User Credentials

The imad213 Python-based credential harvester poses as an Instagram growth tool to steal user credentials and broadcast them to multiple malicious bot services. The attacker maintains remote control via a Netlify-hosted kill switch and operates a coordinated network of phishing websites targeting various social media platforms. #imad213 #IMAD-213 #takipcimx #InstagramGrowthTool

Read More
Cloudy with a Chance of Hijacking Forgotten DNS Records Enable Scam Actor

Hazy Hawk is a sophisticated threat actor that hijacks abandoned cloud resources belonging to high-profile organizations by exploiting DNS misconfigurations, primarily dangling CNAME records. Their hijacked domains are used to host malicious URLs that redirect users to scams and malware through complex traffic distribution systems. #HazyHawk #DNSHijacking #CloudResourceHijacking #CDC #jsorg

Read More