Security Issues in the Global Financial Sector – Malware, Phishing, Deep Web & Dark Web cases in February 2024

Security Issues in the Global Financial Sector – Malware, Phishing, Deep Web & Dark Web cases in February 2024

Statistics of Malware in Distribution Targeting the Financial Sector     Top 10 Major Malware Targeting the Financial Sector   Attack Stage Malware Type MD5 Hash Stage 1 Phishing f7db2045ef80e8e4c86db829ec0b6ee6 Stage 1 WebShell b597418bea2ff4da50540ed191e1bb55 Stage 2 HackTool 18cfc7e41afdeb10b15a54e6e39f0463 Stage 2 HackTool 110dde62258542a1bcdc15a2af5b54d2 Stage 2 Dropper 19c2decfa7271fa30e48d4750c1d18c1 Stage 2 Dropper 27ef6917fe32685fdf9b755eb8e97565

Phishing Malware That Sends Stolen Information Using Telegram API

Phishing Malware That Sends Stolen Information Using Telegram API

Last year, AhnLab SEcurity intelligence Center (ASEC) introduced phishing script files that used Telegram to leak user information [1]. Recently, several phishing scripts using Telegram are being distributed indiscriminately through keywords such as remittance and receipts. Unlike the phishing script files that were distributed in the early days, the latest

Security Issues in the Global Financial Sector – Malware, Phishing, Deep Web & Dark Web cases in January 2024

Security Issues in the Global Financial Sector – Malware, Phishing, Deep Web & Dark Web cases in January 2024

Statistics of Malware Targeting the Financial Sector      Top 10 Major Malware Targeting the Financial Sector   Attack Phase Malware Category MD5 Hash Phase 1 Phishing F57FA515AFB84F034B5025CF597C2AB4 Phase 1 Phishing 03267C03B3511FEFE59C54E582E7A7C9 Phase 2 Backdoor 82D0F2A189262D9555D6DB9723645D07 Phase 2 Backdoor 2F06DD4E6D4C72032CDE55C3D0E88FD3 Phase 2 Downloader 87982F1F940CC4AD215CE2DD3FE45678 Phase 2 Dropper 06AF7E3BD05111DA4DEBC5454B92ED0E Phase 3

Analysis of Phishing Case Impersonating a Famous Korean Portal Login Page

Analysis of Phishing Case Impersonating a Famous Korean Portal Login Page

AhnLab SEcurity intelligence Center (ASEC) has recently analyzed a phishing case where a phishing page was disguised as a login page of a famous Korean portal website. ASEC has then collected some information on the threat actor. The fake login page, which is believed to have been distributed in the

Distribution of Qshing Emails Disguised as Payslips

Distribution of Qshing Emails Disguised as Payslips

AhnLab SEcurity intelligence Center (ASEC) has recently identified the distribution of Qshing emails impersonating the Ministry of Finance of the People’s Republic of China. Qshing is a compound noun from the words “QR code” and “Phishing” that leads to a malicious app being installed or directs users to a phishing

Distribution of Phishing Email Under the Guise of Personal Data Leak (Konni)

Distribution of Phishing Email Under the Guise of Personal Data Leak (Konni)

AhnLab Security Emergency response Center (ASEC) recently identified the distribution of a malicious exe file disguised as material related to a personal data leak, targeting individual users. The final behavior of this malware could not be observed because the C2 was closed, but the malware is a backdoor that receives