“Beep” malware heavily focuses on evasion, having implemented multiple anti-analysis mechanisms before finalizing the full feature set for data theft and the execution of commands. Although its operations in the wild remain limited for the time being
All Articles (37)
The nasty Iranian nation-state APT group, Charming Kitten, actively targets multiple US, Europe, Middle East, and Indian victims. The APT group is associated with the Islamic Revolutionary Guard Corps (IRGC). Over the years, the group has utilized va
Progress in ransomware data recovery is being made, particularly with partial encryption techniques. In this week’s REDSHORT, we’ll discuss the nature of “partial encryption” and introduce a recently released Python tool called White Phoenix, designe
On January 26th, 2023, a version of the U.S. No-Fly list from 2019 was shared on a popular hacking forum. This information was obtained by Swiss hacker “maia arson crimew” from a misconfigured AWS server. In this week’s REDSHORT we’ll examine the nat
January 11TH REDSHORT — Twenty car manufacturers contain API cyber security vulnerabilities. Hackers can track cars in real time, introducing potential physical risks and impacting the privacy of millions of car owners. These vulnerabilities could ha
The worldwide supply chain employs the maritime mode of shipping, 90% along the transportation modes. Red Sky Alliance monthly queries our backend databases, identifying all new data indicators containing Motor Vessel (MV) and Motor Tanker (MT) in th
A ransomware operation known as Medusa has begun to pick up steam in 2023, targeting corporate victims worldwide with million-dollar ransom demands. Like most enterprise-targeting ransomware operations, Medusa has a data leak site named 'Medusa Blog.
MARCH 8TH REDSHORT — Continuing from our report in September, in this week's REDSHORT we'll be discussing another recent LastPass breach that occurred in December. This incident has connections to both the previous incident in August and a recent rep
'NEXUS’ A NEW RISING ANDROID TROJAN, TARGETS 450 FINANCIAL APPLICATIONS. The Nexus trojan appears specifically designed to conduct account takeover attacks: it can overlay on top of target applications, can log the victim’s key presses, can steal two
February 1st REDSHORT — Social Engineering is the term used for a broad range of malicious activities accomplished through human interactions. Social engineering is especially dangerous because it relies on human error rather than software and operat
A recent report from the internet security company Cloudflare details an increase in what is known as hyper-volumetric DDoS attacks since the beginning of this year. One of these attacks was a hyper-volumetric attack boasting more than 71 million HTT
January 18TH REDSHORT — APT Group Dark Pink Doubles Down on Government & Military Targets with Custom Malware. Considered an advanced persistent threat (APT), Dark Pink has launched at least seven successful attacks between June and December 2022. Du
Low voltage power is a current technology standard and will power the future Smart cities, not to mention all 16 sectors of our critical global infrastructure and essential resources. The NEC will introduce a new type of circuit called Class 4, which
An up-and-coming ransomware group, Rhysida, is garnering much attention by intentionally targeting healthcare organizations. In this week's REDSHORT, we'll discuss the short history of this group and the ransomware behind their attacks. In addition,
January 4TH REDSHORT — The pay-per-install distribution method for malware is taking focus, yet again, with the discovery of a new information-stealing malware known as RisePro. This malware is designed to steal information from victims’ machines, li
An up-and-coming ransomware group, Rhysida, is garnering much attention by intentionally targeting healthcare organizations. In this week's REDSHORT, we'll discuss the short history of this group and the ransomware behind their attacks. In addition,
A sophisticated stealer-as-a-ransomware threat dubbed RedEnergy has been spotted in the wild, targeting energy utilities, oil, gas, telecom, and machinery sectors. Following a successful breach, the malicious binary is used as a conduit to set up pe
WEEKLY WEBINAR REDSHORT REGISTRATION
Register for our LIVE REDSHORT. webinars and never miss our weekly broadcast. RED' as in something important from Red Sky Alliance and 'SHORT' as in 10 minutes or less. We will cover highlights of trending topics.
Comments
You need to be a member of Red Sky Alliance to add comments!
Comments are closed.
Comments