Site search

Search results: «Phishing»

Found matches: 6

🔐 Threat actors tied to Russian intelligence are running phishing campaigns to hijack accounts on commercial messaging apps like WhatsApp and Signal. The attacks focus on high-value targets such as government officials, military personnel, politicians, and journalists, with thousands of accounts already compromised.

📩 The scheme relies on social engineering, not technical flaws. Victims receive messages creating a false sense of urgency, often warning of suspicious login attempts. They are tricked into clicking malicious links, scanning QR codes, or sharing verification codes and PINs.

⚠️ If a victim shares their code, attackers can take over the account and impersonate them,...
⚠️ QUICK DESCRIPTION
Threat actors are abusing Google Ads and fake Claude “Artifact” project pages to trick users into downloading malicious installers disguised as AI tools.
These downloads deploy stealers, RATs, and backdoors — all while appearing to be legitimate AI productivity software.

💀 THE THREAT
• Fake Claude “Artifact” project pages delivering malware
• Malicious Google Ads redirecting users to trojanized installers
• Attackers impersonate AI tools to gain trust
• Payloads include stealers, RATs, and backdoors
• Malware hidden inside fake setup files
• Campaign targets users searching for AI tools or templates
👁️ WHY IT’S DANGEROUS
•...
1/6 🐀 DiscordRAT 2.0 – When Discord Becomes a Command Center
image
DiscordRAT 2.0 is a Remote Access Trojan (RAT) that uses as its command-and-control channel.

Instead of connecting to suspicious servers, it communicates through Discord, making detection harder.

2/6 ⚙️ How It Operates

Once installed on a victim’s system, DiscordRAT connects to a hidden Discord bot.

Attackers can then remotely control the infected computer through Discord commands — silently and instantly.

It blends with normal Discord traffic.

3/6 🔥 What Attackers Can Do

• Monitor victim activity
• Access files and folders
• Capture screenshots
• Log keystrokes
•...
🔐 Threat actors tied to Russian intelligence are running phishing campaigns to hijack accounts on commercial messaging apps like WhatsApp and Signal. The attacks focus on high-value targets such as government officials, military personnel, politicians, and journalists, with thousands of accounts already compromised.

📩 The scheme relies on social engineering, not technical flaws. Victims receive messages creating a false sense of urgency, often warning of suspicious login attempts. They are tricked into clicking malicious links, scanning QR codes, or sharing verification codes and PINs.

⚠️ If a victim shares their code, attackers can take over the account and impersonate them,...
“Hacking doesn’t break the locks now... He dressed up as a security guard. "

Even if the file looks secure... Windows doesn't warn you.. You can get the virus.

Hackers are now sending out fake meeting invitations to Zoom and Microsoft Teams with malicious files attached.

What’s the trick ? This file is documented with a stolen or hijacked digital signature.

*Windows will look at it as reliable
*No warning may come up
*Some protection programs can be allowed to pass

Simply: A hacker wears a true security certificate.

You are getting:
"Urgent meeting of the Board of Directors." ”...
BREAKING CYBER NEWS: LEAKBASE SHUT DOWN!
image
In a massive win for international law enforcement, the notorious dark web marketplace LeakBase has been dismantled! 💥

This wasn't just any takedown. Coordinated by Europol and involving over a dozen countries, this operation targeted the very infrastructure of a platform where 142,000 cybercriminals traded stolen personal data and hacked credentials.

What was LeakBase?
It was a central hub for bad actors to buy and sell compromised databases, login credentials, and sensitive information harvested through malware. Think of it as the Amazon for stolen digital identities.

Why this matters:
This is one of...