cryptocurrency theft

  1. North Korean BlueNoroff Uses Deepfakes & Mac Malware in Sophisticated Cyberattacks (2025)

    In a chilling demonstration of how cybercriminals are evolving their attack strategies, security researchers recently uncovered an advanced and highly orchestrated campaign by the North Korean BlueNoroff hacking group that leverages deepfake technology, social engineering, and custom macOS...
  2. Lumma Malware Disaster: Protect Your Windows PC from the Latest Info-Stealer Epidemic

    Few threats in today’s digital landscape have demonstrated such rapid, widespread, and evolving danger as the Lumma information-stealing malware currently impacting hundreds of thousands of Windows PCs. In just two months, Microsoft’s security researchers detected Lumma—also known as LummaC2—on...
  3. Noodlophile Malware Campaign: AI Video Scam & Stealthy Data Theft on Windows

    Enticing users with the promise of AI-powered video creation, cybercriminals have launched a new campaign distributing a previously undocumented malware family, Noodlophile, strategically camouflaged as cutting-edge video generation tools. This campaign uses the allure of widely hyped artificial...
  4. Evolved Microsoft 365 Phishing Kit: How Tycoon2FA’s Advanced Evasion Techniques Threaten Security in

    A Closer Look at the Evolved Microsoft 365 Phishing Kit Cybersecurity experts have recently raised the alarm on a significantly upgraded Microsoft 365 phishing kit that is raising the stakes in today's cybercrime landscape. The notorious Tycoon2FA platform, a phishing-as-a-service (PhaaS) tool...
  5. Beware: Downloaded Office Software Hides Dangerous Malware Threats

    Downloaded Office Software: A Trove of Hidden Cyber Dangers A seemingly innocent download of an Office software package might be a wolf in sheep's clothing. Recent cybersecurity findings reveal a sophisticated cyber threat – malware disguising itself as a Microsoft Office add-on – that poses...
  6. AA21-048A: AppleJeus: Analysis of North Korea’s Cryptocurrency Malware

    Original release date: February 17, 2021 Summary This Advisory uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) framework. See the ATT&CK for Enterprise for all referenced threat actor tactics and techniques. This joint advisory is the result of analytic efforts...