Arab Security Consultants

  • Home
  • Courses
    • EC-Council Programs
    • EC-Council iWeek Courses
    • PECB
      • ISO/IEC 27001 Lead Implementer
      • ISO/IEC 27001 Lead Auditor
    • Cyber Book
  • Organized Events
    • Arab Security Conference
    • Arab Security Cyber WarGames
  • Services
    • CodeRed
    • OhPhish
    • Risk Assessment
    • Social Engineering
    • Identity & Access Security
    • Vulnerability Assessment
    • Penetration Testing
  • Training centers
  • EC-Council with ASC
  • News
  • Contact Us
  • Home
  • Posts tagged "Malware"

Tag: Malware

FIN7, FIN8, and Others Use Ragnar Loader for Persistent Access and Ransomware Operations

Tuesday, 11 March 2025 by Ayman Hamam

Threat hunters have shed light on a “sophisticated and evolving malware toolkit” called Ragnar Loader that’s used by various cybercrime and ransomware groups like Ragnar Locker (aka Monstrous Mantis), FIN7, FIN8, and Ruthless Mantis (ex-REvil). “Ragnar Loader plays a key role in keeping access to compromised systems, helping attackers stay in networks for long-term operations,” Swiss cybersecurity company PRODAFT

  • Published in News
Tagged under: ASC, Cyber Threats, cyberSecurity, ethical hacking, FIN7, FIN8, InfoSec, Malware, Ragnar Loader, Ragnar Locker, Ransomware, Threat Hunting, Threat Intelligence

OilRig Exploits Windows Kernel Flaw in Espionage Campaign Targeting UAE and Gulf

Tuesday, 15 October 2024 by Ayman Hamam

The Iranian threat actor known as OilRig has been observed exploiting a now-patched privilege escalation flaw impacting the Windows Kernel as part of a cyber espionage campaign targeting the U.A.E. and the broader Gulf region. “The group utilizes sophisticated tactics that include deploying a backdoor that leverages Microsoft Exchange servers for credentials theft, and exploiting vulnerabilities like

  • Published in News
Tagged under: APT34, credentials theft, CVE-2024-30088, Cyber espionage, cyberattack, Earth Simnavaz, Gulf region, Malware, Microsoft Exchange, OilRig, privilege escalation, psgfilter.dll, STEALHOOK, U.A.E., vulnerability exploitation, Windows Kernel

Cybercriminals Exploit CrowdStrike Update Mishap to Distribute Remcos RAT Malware

Sunday, 21 July 2024 by Ayman Hamam

Cybersecurity firm CrowdStrike, which is facing the heat for causing worldwide IT disruptions by pushing out a flawed update to Windows devices, is now warning that threat actors are exploiting the situation to distribute Remcos RAT to its customers in Latin America under the guise of a providing a hotfix. The attack chains involve distributing a ZIP

  • Published in News
Tagged under: CrowdStrike, cyberSecurity, IT disruption, Latin America, Malware, mitigation, official support, Remcos RAT, threat actors, Windows devices.

FBI’s Most-Wanted Zeus and IcedID Malware Mastermind Pleads Guilty

Monday, 19 February 2024 by Ayman Hamam

A Ukrainian national has pleaded guilty in the U.S. to his role in two different malware schemes, Zeus and IcedID, between May 2009 and February 2021. Vyacheslav Igorevich Penchukov (aka Vyacheslav Igoravich Andreev, father, and tank), 37, was arrested by Swiss authorities in October 2022 and extradited to the U.S. last year. He was added to the

  • Published in News
Tagged under: Cybercrime, cyberSecurity, FBI, fraud., IcedID, Malware, money laundering, Raccoon, Ukrainian national, Zeus

AllaKore RAT Malware Targeting Mexican Firms with Financial Fraud Tricks

Monday, 29 January 2024 by Ayman Hamam

Mexican financial institutions are under the radar of a new spear-phishing campaign that delivers a modified version of an open-source remote access trojan called AllaKore RAT. The BlackBerry Research and Intelligence Team attributed the activity to an unknown Latin American-based financially motivated threat actor. The campaign has been active since at least 2021. “Lures use Mexican

  • Published in News
Tagged under: AllaKore RAT, ATM security, Banking fraud, BlackBerry Research and Intelligence Team, Command-and-control (C2) server, Crypto trading platforms, CVE-2024-0176, CVE-2024-0177), Cybersecurity Threats, Delphi-based RAT, Financial institutions., Financially motivated threat actor, Geolocation confirmation, IOActive, Lamassu Douro bitcoin ATMs, Malware, Mexican Social Security Institute (IMSS), Phishing attack, Physical access, Spear-phishing campaign, Swiss company, Vulnerabilities (CVE-2024-0175

Chinese Hackers Silently Weaponized VMware Zero-Day Flaw for 2 Years

Monday, 22 January 2024 by Ayman Hamam

An advanced China-nexus cyber espionage group previously linked to the exploitation of security flaws in VMware and Fortinet appliances has been linked to the abuse of a critical vulnerability in VMware vCenter Server as a zero-day since late 2021. “UNC3886 has a track record of utilizing zero-day vulnerabilities to complete their mission without being detected,

  • Published in News
Tagged under: Chinese hackers, Cyber espionage, Cyber threat intelligence, Cybersecurity Risks, Data breach, Endpoint detection and response, Malware, Nation-state actors, Network security, Security flaws, Software updates, UNC3886, Virtualization services, VMware vCenter Server, Zero-Day Vulnerability

Agent Racoon Backdoor Targets Organizations in Middle East, Africa, and U.S.

Sunday, 03 December 2023 by Ayman Hamam

In a recent analysis, Palo Alto Networks Unit 42 researcher Chema Garcia revealed a targeted cyber threat affecting organizations in the Middle East, Africa, and the United States. The unknown threat actor is distributing a sophisticated backdoor named Agent Racoon, developed using the .NET framework. The malware exploits the domain name service (DNS) protocol to

  • Published in News
Tagged under: Africa, AgentRacoon, ASC, Backdoor, cyberSecurity, CyberThreat, DataExfiltration, DataSecurity, DNSProtocol, Egypt, HackerNews, InfoSec, ITSecurity, Malware, MiddleEast, Mimikatz, Ntospy, PaloAltoNetworks, SecurityAlert, TechNews, ThreatAnalysis, Unit42, US
  • Home
  • Contact Us
  • Services
  • Training Centers
  • GET SOCIAL

Arab Security Consultants | Copyright © 2023 All rights reserved.

TOP