A cluster of malicious npm packages — cataloged by researchers as a targeted infostealer campaign dubbed “Solana‑Scan” — has been used to lure Solana ecosystem developers into installing backdoored SDKs that harvest wallet credentials, local keyfiles and a broad sweep of developer artifacts...
The rise of LummaC2 malware as a potent threat to organizational cybersecurity has garnered front-page attention among security professionals and system administrators alike, and with good reason: a joint advisory from the Federal Bureau of Investigation (FBI) and the Cybersecurity and...
The cyberthreat landscape continues to evolve at a relentless pace, with hacktivist groups exhibiting ever-greater skills in stealth, lateral movement, and persistence. In September 2024, a series of coordinated attacks targeted Russian companies, exposing not just technical overlap between two...
The recent investigation into cyberattacks targeting Russian companies underscores a worrying evolution in hacktivist tactics. In a series of incidents during September 2024, two groups—Head Mare and Twelve—appeared to have joined forces, sharing both techniques and even command-and-control (C2)...
Original release date: December 19, 2014
Systems Affected
Microsoft Windows
Overview
US-CERT was recently notified by a trusted third party of cyber threat actors using a Server Message Block (SMB) Worm Tool to conduct cyber exploitation activities recently targeting a major entertainment...