How Blind Eagle and Russian Bulletproof Hosting Are Powering a New Wave of Cyberattacks on Colombian Banks
|

How Blind Eagle and Russian Bulletproof Hosting Are Powering a New Wave of Cyberattacks on Colombian Banks

Imagine waking up to discover your bank account has been emptied overnight—not because you slipped up, but because skilled cybercriminals have orchestrated a complex attack from halfway across the world. That’s not just a hypothetical for Colombian consumers and businesses; it’s the chilling reality behind a sophisticated threat campaign led by Blind Eagle (APT-C-36). This…

Inside the TAG-140 DRAT V2 Campaign: How Evolving RATs Threaten Indian Government, Defense, and Rail Sectors
|

Inside the TAG-140 DRAT V2 Campaign: How Evolving RATs Threaten Indian Government, Defense, and Rail Sectors

Cybersecurity threats are evolving at breakneck speed—and nowhere is this more evident than in the latest campaign unleashed by TAG-140. With a newly weaponized Remote Access Trojan (RAT) called DRAT V2, this elusive group is setting its sights on India’s most critical sectors: government, defense, and railways. If you’re wondering how these attacks work, who…

North Korean Hackers Deploy Python-Based Trojan Targeting Crypto
|

North Korean Hackers Deploy Python-Based Trojan Targeting Crypto

In the ever-evolving landscape of cybersecurity threats, a new Python-based remote access Trojan (RAT) known as PylangGhost has emerged, targeting individuals with expertise in cryptocurrency and blockchain technologies. This latest cyber weapon is attributed to the North Korean-aligned group, Famous Chollima, and has drawn significant attention from cybersecurity experts and organizations worldwide. According to research…

New Malware Campaign Uses Cloudflare Tunnels to Deliver RATs via Phishing Chains
|

New Malware Campaign Uses Cloudflare Tunnels to Deliver RATs via Phishing Chains

In the ever-evolving landscape of cybersecurity, threat actors are constantly on the lookout for innovative methods to bypass security protocols and exploit vulnerabilities. One such method has been observed in a new malware campaign, codenamed SERPENTINE#CLOUD by Securonix. This campaign employs Cloudflare Tunnel subdomains to host malicious payloads and deliver them via phishing chains. In…