cybercrime/malcode – Lifeboat News: The Blog https://lifeboat.com/blog Safeguarding Humanity Mon, 07 Jul 2025 03:03:15 +0000 en-US hourly 1 https://wordpress.org/?v=6.8.1 Criminal Hackers Are Employing AI To Facilitate Identity Theft https://lifeboat.com/blog/2025/07/criminal-hackers-are-employing-ai-to-facilitate-identity-theft https://lifeboat.com/blog/2025/07/criminal-hackers-are-employing-ai-to-facilitate-identity-theft#respond Mon, 07 Jul 2025 03:03:15 +0000 https://lifeboat.com/blog/2025/07/criminal-hackers-are-employing-ai-to-facilitate-identity-theft

Cybercriminals are employing artificial intelligence to steal identities by infiltrating and examining victim networks and employing automated phishing attempts.

]]>
https://lifeboat.com/blog/2025/07/criminal-hackers-are-employing-ai-to-facilitate-identity-theft/feed 0
Massive Android Fraud Operations Uncovered: IconAds, Kaleidoscope, SMS Malware, NFC Scams https://lifeboat.com/blog/2025/07/massive-android-fraud-operations-uncovered-iconads-kaleidoscope-sms-malware-nfc-scams https://lifeboat.com/blog/2025/07/massive-android-fraud-operations-uncovered-iconads-kaleidoscope-sms-malware-nfc-scams#respond Fri, 04 Jul 2025 11:10:50 +0000 https://lifeboat.com/blog/2025/07/massive-android-fraud-operations-uncovered-iconads-kaleidoscope-sms-malware-nfc-scams

IconAds ad fraud operation disrupts 352 Android apps, impacting global users with hidden ads and obfuscation.

]]>
https://lifeboat.com/blog/2025/07/massive-android-fraud-operations-uncovered-iconads-kaleidoscope-sms-malware-nfc-scams/feed 0
Over 40 Malicious Firefox Extensions Target Cryptocurrency Wallets, Stealing User Assets https://lifeboat.com/blog/2025/07/over-40-malicious-firefox-extensions-target-cryptocurrency-wallets-stealing-user-assets https://lifeboat.com/blog/2025/07/over-40-malicious-firefox-extensions-target-cryptocurrency-wallets-stealing-user-assets#respond Fri, 04 Jul 2025 11:10:37 +0000 https://lifeboat.com/blog/2025/07/over-40-malicious-firefox-extensions-target-cryptocurrency-wallets-stealing-user-assets

Cybersecurity researchers have uncovered over 40 malicious browser extensions for Mozilla Firefox that are designed to steal cryptocurrency wallet secrets, putting users’ digital assets at risk.

“These extensions impersonate legitimate wallet tools from widely-used platforms such as Coinbase, MetaMask, Trust Wallet, Phantom, Exodus, OKX, Keplr, MyMonero, Bitget, Leap, Ethereum Wallet, and Filfox,” Koi Security researcher Yuval Ronen said.

The large-scale campaign is said to have been ongoing since at least April 2025, with new extensions uploaded to the Firefox Add-ons store as recently as last week.

]]>
https://lifeboat.com/blog/2025/07/over-40-malicious-firefox-extensions-target-cryptocurrency-wallets-stealing-user-assets/feed 0
That Network Traffic Looks Legit, But it Could be Hiding a Serious Threat https://lifeboat.com/blog/2025/07/that-network-traffic-looks-legit-but-it-could-be-hiding-a-serious-threat https://lifeboat.com/blog/2025/07/that-network-traffic-looks-legit-but-it-could-be-hiding-a-serious-threat#respond Thu, 03 Jul 2025 11:15:49 +0000 https://lifeboat.com/blog/2025/07/that-network-traffic-looks-legit-but-it-could-be-hiding-a-serious-threat

SOCs face evolving cyber threats as 80% of attacks mimic user behavior. Discover how multi-layered NDR detection strategies enhance defense.

]]>
https://lifeboat.com/blog/2025/07/that-network-traffic-looks-legit-but-it-could-be-hiding-a-serious-threat/feed 0
Hackers Using PDFs to Impersonate Microsoft, DocuSign, and More in Callback Phishing Campaigns https://lifeboat.com/blog/2025/07/hackers-using-pdfs-to-impersonate-microsoft-docusign-and-more-in-callback-phishing-campaigns https://lifeboat.com/blog/2025/07/hackers-using-pdfs-to-impersonate-microsoft-docusign-and-more-in-callback-phishing-campaigns#respond Thu, 03 Jul 2025 11:15:31 +0000 https://lifeboat.com/blog/2025/07/hackers-using-pdfs-to-impersonate-microsoft-docusign-and-more-in-callback-phishing-campaigns

Cybersecurity researchers are calling attention to phishing campaigns that impersonate popular brands and trick targets into calling phone numbers operated by threat actors.

“A significant portion of email threats with PDF payloads persuade victims to call adversary-controlled phone numbers, displaying another popular social engineering technique known as Telephone-Oriented Attack Delivery (TOAD), also known as callback phishing,” Cisco Talos researcher Omid Mirzaei said in a report shared with The Hacker News.

An analysis of phishing emails with PDF attachments between May 5 and June 5, 2025, has revealed Microsoft and Docusign to be the most impersonated brands. NortonLifeLock, PayPal, and Geek Squad are among the most impersonated brands in TOAD emails with PDF attachments.

]]>
https://lifeboat.com/blog/2025/07/hackers-using-pdfs-to-impersonate-microsoft-docusign-and-more-in-callback-phishing-campaigns/feed 0
TA829 and UNK_GreenSec Share Tactics and Infrastructure in Ongoing Malware Campaigns https://lifeboat.com/blog/2025/07/ta829-and-unk_greensec-share-tactics-and-infrastructure-in-ongoing-malware-campaigns https://lifeboat.com/blog/2025/07/ta829-and-unk_greensec-share-tactics-and-infrastructure-in-ongoing-malware-campaigns#respond Wed, 02 Jul 2025 07:11:26 +0000 https://lifeboat.com/blog/2025/07/ta829-and-unk_greensec-share-tactics-and-infrastructure-in-ongoing-malware-campaigns

Cybersecurity researchers have flagged the tactical similarities between the threat actors behind the RomCom RAT and a cluster that has been observed delivering a loader dubbed TransferLoader.

Enterprise security firm Proofpoint is tracking the activity associated with TransferLoader to a group dubbed UNK_GreenSec and the RomCom RAT actors under the moniker TA829. The latter is also known by the names CIGAR, Nebulous Mantis, Storm-0978, Tropical Scorpius, UAC-0180, UAT-5647, UNC2596, and Void Rabisu.

The company said it discovered UNK_GreenSec as part of its investigation into TA829, describing it as using an “unusual amount of similar infrastructure, delivery tactics, landing pages, and email lure themes.”

]]>
https://lifeboat.com/blog/2025/07/ta829-and-unk_greensec-share-tactics-and-infrastructure-in-ongoing-malware-campaigns/feed 0
Blind Eagle Uses Proton66 Hosting for Phishing, RAT Deployment on Colombian Banks https://lifeboat.com/blog/2025/07/blind-eagle-uses-proton66-hosting-for-phishing-rat-deployment-on-colombian-banks https://lifeboat.com/blog/2025/07/blind-eagle-uses-proton66-hosting-for-phishing-rat-deployment-on-colombian-banks#respond Tue, 01 Jul 2025 11:13:44 +0000 https://lifeboat.com/blog/2025/07/blind-eagle-uses-proton66-hosting-for-phishing-rat-deployment-on-colombian-banks

Trustwave links Blind Eagle cybercrime group to Proton66 hosting, targeting Colombian banks with VBS and RATs.

]]>
https://lifeboat.com/blog/2025/07/blind-eagle-uses-proton66-hosting-for-phishing-rat-deployment-on-colombian-banks/feed 0
Switzerland says government data stolen in ransomware attack https://lifeboat.com/blog/2025/07/switzerland-says-government-data-stolen-in-ransomware-attack https://lifeboat.com/blog/2025/07/switzerland-says-government-data-stolen-in-ransomware-attack#respond Tue, 01 Jul 2025 11:13:01 +0000 https://lifeboat.com/blog/2025/07/switzerland-says-government-data-stolen-in-ransomware-attack

The government in Switzerland is informing that sensitive information from various federal offices has been impacted by a ransomware attack at the third-party organization Radix.

The hackers have stolen data from Radix systems and later leaked it on the dark web, the Swiss government says.

The exposed data is being analyzed with the help of the country’s National Cyber Security Centre (NCSC) to determine which government agencies are impacted and to what effect.

]]>
https://lifeboat.com/blog/2025/07/switzerland-says-government-data-stolen-in-ransomware-attack/feed 0
Dear readers, please see the latest issue of the Security & Tech Insights newsletter https://lifeboat.com/blog/2025/06/dear-readers-please-see-the-latest-issue-of-the-security-tech-insights-newsletter https://lifeboat.com/blog/2025/06/dear-readers-please-see-the-latest-issue-of-the-security-tech-insights-newsletter#respond Sat, 28 Jun 2025 19:07:27 +0000 https://lifeboat.com/blog/2025/06/dear-readers-please-see-the-latest-issue-of-the-security-tech-insights-newsletter

Please see the latest issue of the Security & Tech Insights newsletter on the impact of artificial intelligence. Thanks!


Dear readers, please see the latest issue of the Security & Tech Insights newsletter. AI is impacting every aspect of our lives, and this issue provides a compendium of articles that address some of those topics, including cybersecurity. I believe it will be providing a useful resource for everyone interested in emerging tech and cybersecurity, and especially AI. Thanks, and stay safe! Best, Chuck Brooks.

(Kindly follow me on LinkedIn for regular posts on topics of emerging tech, cybersecurity, innovation, risk management, and govcon).

#artificialintelligence #cybersecurity #tech #innovation #future

]]>
https://lifeboat.com/blog/2025/06/dear-readers-please-see-the-latest-issue-of-the-security-tech-insights-newsletter/feed 0
GIFTEDCROOK Malware Evolves: From Browser Stealer to Intelligence-Gathering Tool https://lifeboat.com/blog/2025/06/giftedcrook-malware-evolves-from-browser-stealer-to-intelligence-gathering-tool https://lifeboat.com/blog/2025/06/giftedcrook-malware-evolves-from-browser-stealer-to-intelligence-gathering-tool#respond Sat, 28 Jun 2025 15:10:54 +0000 https://lifeboat.com/blog/2025/06/giftedcrook-malware-evolves-from-browser-stealer-to-intelligence-gathering-tool

The threat actor behind the GIFTEDCROOK malware has made significant updates to turn the malicious program from a basic browser data stealer to a potent intelligence-gathering tool.

“Recent campaigns in June 2025 demonstrate GIFTEDCROOK’s enhanced ability to exfiltrate a broad range of sensitive documents from the devices of targeted individuals, including potentially proprietary files and browser secrets,” Arctic Wolf Labs said in a report published this week.

“This shift in functionality, combined with the content of its phishing lures, […] suggests a strategic focus on intelligence gathering from Ukrainian governmental and military entities.”

]]>
https://lifeboat.com/blog/2025/06/giftedcrook-malware-evolves-from-browser-stealer-to-intelligence-gathering-tool/feed 0