Blog

Latest articles from SOCRadar

Mother of the Threats: Threat As a Service
September 12, 2023

Mother of the Threats: Threat as a Service

Anonymous Russia's botnet service Tesla-bot announced a new malicious service model on its Telegram channel. This new type of service and concept, which they call as TaaS (Threat as a Service), appears to be a… Continue Reading

Cisco Zero-Day Vulnerability Exploited by LockBit and Akira (CVE-2023-20269)
September 12, 2023

Cisco Zero-Day Vulnerability Exploited by LockBit and Akira (CVE-2023-20269)

Cisco recently issued an advisory regarding a zero-day vulnerability, CVE-2023-20269, in its Adaptive Security Appliance (ASA) and Firepower Threat Defense (FTD) products.  The zero-day vulnerability has been exploited in the wild, with reports indicating that… Continue Reading

Cobalt Strike Leak, Sales of Unauthorized Access and Credit Card Data
September 12, 2023

Cobalt Strike Leak, Sales of Unauthorized Access and Credit Card Data

The SOCRadar Dark Web Team conducts continuous monitoring of the dark web, uncovering the latest threats that require your attention. In this week's update, there were reports of unauthorized access sales related to a Mexican… Continue Reading

Telegram Hit by a DDoS Attack: What Is the Cause Behind It?
September 11, 2023

Telegram Hit by a DDoS Attack: What Is the Cause Behind It?

In a recent update, a well-known and notorious threat actor declared their targeting of Telegram. This group initiated the attack after Telegram's decision to ban their primary account on the messaging platform.  The actor in… Continue Reading

Major Cyberattacks in Review: August 2023
September 11, 2023

Major Cyberattacks in Review: August 2023

August 2023 has not passed without its share of significant cyberattacks. Among the incidents of last month, we have observed multiple data breaches involving well-known threat actors. Specifically, the MOVEit Transfer attacks carried out by… Continue Reading

‘Classified’ Intel on the ‘Public’ Telegram Channel: Pentagon US Leak
September 7, 2023

‘Classified’ Intel on the ‘Public’ Telegram Channel: Pentagon US Leak

In the rapidly evolving landscape of digital communication, Telegram has emerged as a prominent platform for various user groups from underground circles. The channels, groups and private chat rooms established by threat actors have exponentially… Continue Reading

Microsoft Reveals How Storm-0558 Acquired the Signing Key: They Stole From a Crash Dump
September 7, 2023

Microsoft Reveals How Storm-0558 Acquired the Signing Key: They Stole From a Crash Dump

Microsoft previously disclosed the successful thwarting of an attack orchestrated by Storm-0558, a threat actor based in China. The breach, reported on June 16, 2023, allowed the threat actors to infiltrate Microsoft accounts by exploiting… Continue Reading

Main Analytical Frameworks for Cyber Threat Intelligence
September 6, 2023

Main Analytical Frameworks for Cyber Threat Intelligence

Threat intelligence is a cyber-security discipline focusing on detailed knowledge about the cyber threats targeting an organization. Threat Intelligence Platforms create intelligence information by gathering raw threat data and security-related information from multiple sources, both… Continue Reading

ASUS Routers Under Risk of RCE Attacks: Critical Vulnerabilities Found (CVE-2023-39238, CVE-2023-39239, CVE-2023-39240)
September 6, 2023

ASUS Routers Under Risk of RCE Attacks: Critical Vulnerabilities Found (CVE-2023-39238, CVE-2023-39239, CVE-2023-39240)

Security researchers have recently unearthed three security vulnerabilities affecting several ASUS router models. ASUS, renowned as one of the leading networking manufacturers, boasts a substantial global user base of gamers, streamers, and various other consumers… Continue Reading

Dark Web Profile: Medusa Ransomware (MedusaLocker)
September 5, 2023

Dark Web Profile: Medusa Ransomware (MedusaLocker)

In ancient Greek mythology, Medusa stands as one of the most iconic and feared figures. With a head full of venomous snakes in place of hair, she had the power to turn anyone who gazed… Continue Reading

Sales of International IDs, UK Bank Leads, Fully Undetectable Crypter, US Instagram Database Leak
September 5, 2023

Sales of International IDs, UK Bank Leads, Fully Undetectable Crypter, US Instagram Database Leak

Introducing our weekly Dark Web digest, where we explore the most recent occurrences in the online underworld. Our dedicated SOCRadar Dark Web Team has been hard at work unearthing critical discoveries that demand your attention. … Continue Reading

Threat Actors Accessed UK Military Data From Weakest Link
September 5, 2023

Threat Actors Accessed UK Military Data From Weakest Link

On the 13th of August, The LockBit Ransomware group added a new victim to its list. The victim supplier, manufacturing company Zaun, expressed its belief that no classified information had been downloaded. However, reports suggested… Continue Reading

MalDoc in PDF: A Novel Method to Distribute Malicious Macros
September 5, 2023

MalDoc in PDF: A Novel Method to Distribute Malicious Macros

Since Microsoft disabled Macros by default, threat actors have actively experimented with alternative attack methods. They utilize various other file structures to distribute malicious content to their victims. Notably, notorious malware strains like Emotet, QakBot,… Continue Reading

Top 10 Best Free Cyber Threat Intelligence Sources and Tools in 2023
September 4, 2023

Top 10 Best Free Cyber Threat Intelligence Sources and Tools in 2023

Keeping abreast of cybersecurity developments has become a challenge, given the constantly evolving landscape. This includes newly discovered vulnerabilities, new attack methodologies, and the tactics, techniques, and procedures (TTPs) used by emerging cyber attackers. Consequently,… Continue Reading

Cyber Threat Intelligence (CTI) Roles for Ransomware Protection
September 4, 2023

Cyber Threat Intelligence (CTI) Roles for Ransomware Protection

Ransomware attacks remain one of the most significant cyber threats against organizations today. Despite numerous countries launching coordinated efforts to combat ransomware groups through law enforcement takedowns, cryptocurrency seizures, and indictments, the crime continues to… Continue Reading

Don't be Blinded by What You See: Demystifying Homograph Attacks
September 1, 2023

Don’t be Blinded by What You See: Demystifying Homograph Attacks

From Nigerian Princes to Crafty Codes: The Evolution of Phishing Remember the days when our inboxes were graced by those endearing messages from a distant "Nigerian Prince"? Ah, good times, right? If you're thinking, "What… Continue Reading

QakBot, One of The Most Observed Malware
August 31, 2023

QakBot, One of The Most Observed Malware

[Update] November 22, 2023: See the subheading "Possible Successors of QakBot: DarkGate and Pikabot." [Update] October 9, 2023: See the subheading: "Potential QakBot Resurgence." Qakbot, a versatile second-stage malware endowed with backdoor capabilities, was initially… Continue Reading

Ferrari Breach, 8.3M French Citizen Data Leak, Jeeves Card Leak & More
August 28, 2023

Ferrari Breach, 8.3M French Citizen Data Leak, Jeeves Card Leak & More

Welcome to this week's Dark Web roundup, where we delve into the latest unsettling incidents that have emerged from the depths of the hidden online realm. Our SOCRadar Dark Web Team has been busy digging… Continue Reading

August 28, 2023

The Role of Threat Intelligence in Anti-Fraud Efforts

In an age where our lives are seamlessly intertwined with the digital realm, tales of unexpected encounters with scammers have become all too familiar. The unsettling scam call appears to be from a legitimate government… Continue Reading

Chain Reactions: Footprints of Major Supply Chain Attacks
August 28, 2023

Chain Reactions: Footprints of Major Supply Chain Attacks

In today's interconnected digital ecosystem, supply chain attacks have emerged as one of the most potent threats. A supply chain attack occurs when threat actors target organizations by focusing on weaker links in their supply… Continue Reading

SOCRadar helps you visualize digital risk, and reduce your company's attack surface
Request Demo