Remcos RAT Distributed as UUEncoding (UUE) File

Remcos RAT Distributed as UUEncoding (UUE) File

AhnLab SEcurity intelligence Center (ASEC) recently discovered that Remcos RAT is being distributed via UUEncoding (UUE) files compressed using Power Archiver. The image below shows a phishing email distributing the Remcos RAT downloader. Recipients must be vigilant as phishing emails are disguised as emails about importing/exporting shipments or quotations. 1.

Threat Trend Report on  Operation Thumb King – Larva-24001(Threat Group Newly Targeting Korean Corporations)

Threat Trend Report on Operation Thumb King – Larva-24001(Threat Group Newly Targeting Korean Corporations)

Overview   Operation Thumb King is a cyberthreat campaign that has been launching attacks against South Korea since May 2023. While the malware structure and file names are similar to a previous Chinese threat group, the specific group has not been ascertained and so it has been given the temporary

Google Chrome Browser (125.0.6422.112/.113) Security Update Advisory

Overview   Google has released an update to address a vulnerability in the Chrome(https://www.google.com/chrome) browser....

Cisco Family May 2024 1st Security Update Advisory

Overview   Cisco(https://www.cisco.com) has released a security update that fixes vulnerabilities in products it has...

Atlassian Family Security Update Advisory

Overview   Atlassian has released an update to address a vulnerability in their products. Users...

Threat Actors’ Systems Can Also Be Exposed and Used by Other Threat Actors

Threat Actors’ Systems Can Also Be Exposed and Used by Other Threat Actors

Types of cyberattack include not only Advanced Persistent Threat (APT) attacks targeting a few specific companies or organizations but also scan attacks targeting multiple random servers connected to the Internet. This means that the infrastructures of threat actors can become the targets of cyberattack alongside companies, organizations, and personal users.

APT Attacks Using Cloud Storage

APT Attacks Using Cloud Storage

AhnLab SEcurity intelligence Center (ASEC) has been sharing cases of attacks in which threat actors utilize cloud services such as Google Drive, OneDrive, and Dropbox to collect user information or distribute malware. [1][2][3] The threat actors mainly upload malicious scripts, RAT malware strains, and decoy documents onto the cloud servers to

Argo CD Package Security Update Advisory

Overview   A security update has been made available to fix a vulnerability in the...

Zabbix Server Product Security Update Advisory

Overview   An update has been released to address a vulnerability in Zabbix server product....

Fluent Bit Product Security Update Advisory

Overview   An update has been released to address vulnerabilities in Fluent Bit products. Users...