3 links
tagged with all of: malware + cybersecurity + social-engineering
Click any tag below to further narrow down your results
Links
A North Korean hacking group, dubbed Elusive Comet, has been caught using Zoom's remote control feature to hijack victims' computers during seemingly legitimate business calls. By employing social engineering tactics, they trick individuals into granting remote access, allowing malware installation and data exfiltration.
A sophisticated phishing scheme named BeaverTail masquerades as a job offer for an AI engineering role, tricking developers into executing malicious code from a fake GitHub repository. This malware operates in five stages, stealing sensitive information, establishing remote access, and deploying additional malicious components while exploiting trust through social engineering tactics.
A new campaign utilizing ClickFix attacks is now targeting both Windows and Linux systems, with the threat group APT36 adapting social engineering tactics to trick users into executing malicious commands. The Linux variant involves redirecting victims to a CAPTCHA page that prompts them to run a benign command, potentially paving the way for future attacks. Users are advised to avoid executing unknown commands to mitigate the risk of malware infections.