#credential-harvesting

[ follow ]
Information security
fromSecurityWeek
1 day ago

ShinyHunters-Branded Extortion Activity Expands, Escalates

ShinyHunters' extortion campaigns are expanding, using vishing and victim-branded credential harvesting to compromise SSO and bypass MFA in cloud and SaaS environments.
fromThe Hacker News
1 week ago

China-Linked Hackers Have Used the PeckBirdy JavaScript C2 Framework Since 2023

The cybersecurity company said it identified the PeckBirdy script framework in 2023 after it observed multiple Chinese gambling websites being injected with malicious scripts, which are designed to download and execute the primary payload in order to facilitate the remote delivery and execution of JavaScript. The end goal of this routine is to serve fake software update web pages for Google Chrome so as to trick users into downloading and running bogus update files, thereby infecting the machines with malware in the process.
Information security
fromThe Hacker News
2 weeks ago

China-Linked APT Exploits Sitecore Zero-Day in Attacks on American Critical Infrastructure

Cisco Talos, which is tracking the activity under the name UAT-8837, assessed it to be a China-nexus advanced persistent threat (APT) actor with medium confidence based on tactical overlaps with other campaigns mounted by threat actors from the region. The cybersecurity company noted that the threat actor is "primarily tasked with obtaining initial access to high-value organizations," based on the tactics, techniques, and procedures (TTPs) and post-compromise activity observed.
Information security
Information security
fromSecuritymagazine
2 weeks ago

What You Need to Know About the New LinkedIn Phishing Scheme

Attackers post LinkedIn-style comments claiming account restrictions to trick users into clicking lnkd.in links that lead to credential-harvesting pages.
#apt28
fromDataBreaches.Net
3 months ago

Russian Police Bust Suspected Meduza Infostealer Developers - DataBreaches.Net

Russian police arrested "three young IT specialists" suspected of developing and selling the Meduza credential-harvesting malware. Authorities from the Ministry of Internal Affairs of Russia, together with police investigators, charged the men with developing and supplying the information-stealing malware, and tied it to an attack that breached and stole data from a government institution in the country's southern Astrakhan region in May, said a ministry spokeswoman in a Russian-language post to Telegram.
Information security
Information security
fromThe Hacker News
3 months ago

Qilin Ransomware Combines Linux Payload With BYOVD Exploit in Hybrid Attack

Qilin ransomware has conducted persistent global attacks since 2025, exploiting leaked admin credentials to harvest credentials and exfiltrate data across multiple sectors.
Information security
fromIT Pro
3 months ago

Hackers are using a new phishing kit to steal Microsoft 365 credentials and MFA tokens - Whisper 2FA is evolving rapidly and has been used in nearly one million attacks since July

Whisper 2FA is a PhaaS tool that steals credentials and MFA tokens from Microsoft 365 accounts while evading detection through advanced obfuscation.
Information security
fromThe Hacker News
3 months ago

175 Malicious npm Packages with 26,000 Downloads Used in Credential Phishing Campaign

175 malicious npm packages host redirect scripts via the unpkg CDN to facilitate Beamglea credential-harvesting phishing targeting over 135 industrial, technology, and energy companies.
Information security
fromSecuritymagazine
8 months ago

Credential Harvesting Becomes Top Retail Data Threat

Credential harvesting is now the top threat to retail cybersecurity, surpassing payment card theft.
The retail sector faced a 56% increase in cyberattacks in 2023, indicating rising risks.
Employee training significantly mitigates vulnerability to phishing attacks in retail.
Growth hacking
fromThe Hacker News
9 months ago

Phishers Exploit Google Sites and DKIM Replay to Send Signed Emails, Steal Credentials

An advanced phishing attack uses Google's infrastructure to send legitimate-looking emails that direct victims to spoofed credential harvesting sites.
[ Load more ]