#attacks

2025-05-01

Russia is preparing something in #Belarus under guise of military drills

“Look at Belarus — this summer, #Russia is preparing something there under the guise of #military #exercises. This is how its new #attacks usually start,” Zelensky said

“But where this time? I don’t know. #Ukraine? #Lithuania? #Poland? God forbid! But we all have to be prepared. All our institutions are open to cooperation.”

kyivindependent.com/zelensky-w

#RussianAggression #Imperialism #StandWithUkraine #RussianPropaganda

2025-04-30

#AI Code #Hallucinations Increase the Risk of ‘Package Confusion’ #Attacks

A new #study found that code generated by AI is more likely to contain made-up information that can be used to trick software into interacting with #malicious #code.

wired.com/story/ai-code-halluc

2025-04-30

#France calls #UN Security Council meeting over #Russian #attacks on civilians in Ukraine

#Russia has intensified its #missile and #drone #attacks against #Ukrainian cities. towns & #civilians even as the U.S. seeks to broker a peace deal. Kyiv has called for a full, unconditional #ceasefire as the first step in the #peace process — a request #Moscow continues to reject.

kyivindependent.com/france-cal

#RussianWarCrimes #RussianAggression #StandWithUkraine

MrsNo1SpecialMrsNo1Special
2025-04-29

Ransomware attacks have evolved beyond simple data encryption, with cybercriminals now using double extortion tactics to increase their leverage over victims. Companies that pay the ransom to regain access to their files may still face data leaks, regulatory penalties, and reputational...

medium.com/@mrsno1special/rans

#

Saupreiss #Präparat500Saupreiss@pfalz.social
2025-04-27

Dear Canadians:

Judging from our experience, #terror #attacks like that in #Vancouver shortly before #elections suddenly stop after elections.

🇨🇦

#Canada

2025-04-24

Trump Urges Vladimir to Halt Attacks on Kyiv Amid Growing Discontent  
tinyurl.com/29r97tfv

Vadim aka t-makervadim@body.social
2025-04-24
2025-04-23

Farmaajo Justifies Troop Pullout from Aden Yabaal Amid Rising Al-Shabaab Attacks in Central Somalia  
tinyurl.com/26ga2gev

Rootbrianrootbrian
2025-04-18

Wish people would keep their dogs on a leash on trailways, pathways (people bike on these) and in parks where people are known to have children around.
Nobody wants to get attacked, lunged at or bitten on their way to a destination, much less have to rush their child to a hospital.

Hit new slatestHitnewslatest
2025-04-13

Hackers bypass Gmail & Microsoft 2FA with advanced phishing attacks. Protect your accounts now with stronger security measures.


hitnewslatest.com/2025/04/gmai

2025-04-11

:androidalt: :apple_inc: Phishing Platform 'Lucid' behind Wave of iOS and Android SMS Attacks.

⚠️Beware⚠️, a phishing-as-a-service [PhaaS] platform named 'Lucid' has been targeting 169 entities in 88 countries using well-crafted messages sent on iMessage [iOS] and RCS [Android].

catalyst.prodaft.com/public/re

#apple #imessage #android #rcs #sms #spam #lucid #phishing #messages #attacks #it #security #privacy #engineer #media #tech #news

[ImageSource: Prodaft]

Device Farm used for spamming Targets.

Lucid operators use large-scale iOS and Android device farms to send text messages. For iMessage, Lucid uses temporary Apple IDs. For RCS, the threat actors exploit carrier-specific implementation flaws in sender validation.

"The main purpose of showcasing phishing messages being sent from victim devices while driving is to demonstrate how easily individuals can become involved in such operations," Prodaft said. "Some threat actors may be drawn to low-risk, low-profit spam campaigns that require minimal technical skills or infrastructure — often relying on virtualization tools or repurposed physical devices to automate message delivery at scale."

⚠️When receiving a spam message on your device urging you to follow an embedded link or reply to the message, simply ignore it. Instead, log in to the actual service directly and check for pending alerts or bills.⚠️
Andrew 🌻 Brandt 🐇threatresearch@infosec.exchange
2025-04-10

However, because this attack has been going on for two weeks, some endpoint protection tools (well, about a third of them) are catching on that this particular file is bad, and should feel bad.

virustotal.com/gui/file/13d71b

The most important lesson here is that attackers always come up with new ways to evade detection. Using a commercially available, normally legitimate remote access tool with a valid cryptographic signature lets the attacker bypass some kinds of endpoint detection.

Remember to check the From: address in emails, and the destination of any links they point to. You can do this by hovering your mouse over the link without clicking, and waiting a second. If it says it's from the SSA, but it isn't pointing to SSA.gov, then it's a lie.

If you find content like this useful, please follow me here, or on LinkedIn: linkedin.com/in/andrew-brandt-

9/fin

#spam #malware #malspam #ConnectWise #attacks

24 out of 73 endpoint protection clients tell you not to chew this gum or open this file. The others are just wrong.
Andrew 🌻 Brandt 🐇threatresearch@infosec.exchange
2025-04-10

When clicked, the button delivers malware, but it's an unexpected payload: A client installer for the commercial remote-access tool ConnectWise.

Every time I clicked the download link, it gave me the same file with six different random digits appended to the filename. Note that it is not, as the website implies, a PDF document, but a Windows executable file, with a .exe extension.

8/

#malware #spam #malspam #ConnectWise #attacks

The payload icons are generic and full of terrorsCryptographically signed by ConnectWise? It's actually a real ConnectWise client installer.
Andrew 🌻 Brandt 🐇threatresearch@infosec.exchange
2025-04-10

This is where I tell you: don't do this! I am a trained professional. I click all the bad links so you don't have to. I am going to show you what happens next.

A button appears on this page, labeled "Access Your Statement." The site serving up this payload delivers a file named "Social Security Statement Documents [six digit random number].exe"

7/

#malware #spam #malspam #attacks #ConnectWise

The site delivers a file named "Social Security Statement Documents [six random numbers].exe" and the numbers change every time you download the file.
Andrew 🌻 Brandt 🐇threatresearch@infosec.exchange
2025-04-10

Finally the target lands on a page on the InMotion site that closely resembles the look-and-feel of the content in the email message.

The page tells the visitor, in part "Download your statement as a PDF file" and "For security reasons, we recommend accessing your statement through your secure device."

Spoiler alert: It was not a PDF file.

(Edit: A reader informs me that this appears to be the hosting space used by the temp agency website, and that for whatever reason, the URL appears differently here.)

6/

#malware #spam #malspam #attacks #ConnectWise

A fake Social Security Administration page that tries to get you to download an executable.

The screenshot of the page shows a grey box on the page. Apparently the scammers were trying to load the SSA logo from SSA's own website in this spot, and the website did not allow third-party loading of the logo from their website on other websites, so it just shows as a grey box.

This is good, scam-hardened web design practice. The other logo on the page is hosted locally on the website hosting the scam.
Andrew 🌻 Brandt 🐇threatresearch@infosec.exchange
2025-04-10

The target's browser then lands on another website, hosted by a large hosting service, InMotion Hosting. As with the temp agency website, the attackers have set up multiple URLs on this site, where the first URL performs a 302 redirect to go to the second URL, for no apparent reason other than to create the URL equivalent of a Rube Goldberg contraption.

5/

#malware #spam #malspam #attacks #ConnectWise

A compromised site redirects to a site controlled by the threat actor, hosted by InMotion Hosting
Andrew 🌻 Brandt 🐇threatresearch@infosec.exchange
2025-04-10

That link then immediately 302 redirects the target's browser to a link on a second website, one that belongs to a temp agency based in the US state of Maryland.

The attackers have created two URLs on this company's site for this purpose. The first one redirects to the second one.

Again, the site appears to have been compromised and used specifically for the purpose of obfuscating the redirection chain.

4/

#malware #spam #malspam #attacks #ConnectWise

Redirecting to a page on the same website, for no apparent reason

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst