company logo

Product

Our Product

We are Reshaping the way Developers find and fix vulnerabilities before they get exploited.

Solutions

By Industry

BFSI

Healthcare

Education

IT & Telecom

Government

By Role

CISO/CTO

DevOps Engineer

Resources

Resource Library

Get actionable insight straight from our threat Intel lab to keep you informed about the ever-changing Threat landscape.

Subscribe to Our Weekly Threat Digest

Company

Contact Us

Have queries, feedback or prospects? Get in touch and we shall be with you shortly.

loading..
loading..
loading..
Loading...

Misconfiguration

Aviation

Akasa

loading..
loading..
loading..

Akasa Airlines confirms security breach after unauthorized access

Akasa Airlines configuration resulted in the security breach compromising the personal information of a few of its registered users following an authorized acce...

29-Aug-2022
2 min read

No content available.

Related Articles

loading..

Web Injection

Frigidstealer

Protect your devices from the growing FakeUpdate malware campaign. Learn about F...

A new wave of cybercrime campaigns is making waves, with two malicious groups—TA2726 and TA2727—distributing a potent macOS infostealer, **FrigidStealer**, through FakeUpdate schemes. These campaigns, first identified by Proofpoint researchers, also use Windows and Android payloads, significantly expanding their target range. ### **Role of FakeUpdate Campaigns in Cybercrime** FakeUpdate campaigns are a key method for cybercriminals to distribute malware across devices. Malicious JavaScript is injected into compromised websites, prompting users with fake browser update notifications. The notification, which appears to be from legitimate services like Google or Safari, misleads users into downloading harmful files when they click "Update." This **malware distribution technique** uses a Traffic Distribution System (TDS) to filter victims based on factors such as location, device type, and OS, making detection increasingly difficult for both users and security professionals. ### **Dual Role of TA2726 and TA2727** Two distinct cybercriminal groups are behind the latest surge in FakeUpdate attacks. **TA2726** acts as a traffic distributor, redirecting victims to malicious websites. Active since at least September 2022, TA2726 frequently utilizes the Keitaro TDS to manage its traffic and collaborate with other threat actors. In contrast, **TA2727**, a financially motivated group identified in early 2025, is responsible for distributing the actual malware. Their payloads include **Lumma Stealer** for Windows, **Marcher** for Android, and **FrigidStealer** for macOS. The group's swift adaptation of malicious tools highlights the growing sophistication of these campaigns. ### **FrigidStealer: A New macOS Threat** The newly discovered **FrigidStealer** malware targets macOS users, marking a significant evolution in the FakeUpdate landscape. Built on the **WailsIO framework** using the Go programming language, FrigidStealer is designed to blend seamlessly into the system. Once activated, it extracts sensitive data, including saved passwords and cookies from browsers like Safari and Chrome. ### **What Makes FrigidStealer Dangerous?** FrigidStealer doesn't stop at browser credentials. It also searches for **crypto wallet** information stored on the Mac's Desktop and Documents folders, collects sensitive **Apple Notes**, and scans the user's home directory for documents, spreadsheets, and other personal files. This exfiltrated data is compressed and transferred to the attacker's **command-and-control server** at "askforupdate[.]org." The malware's ability to steal both personal and financial information makes it a severe threat to both individual users and businesses alike, contributing to a rising number of data breaches and identity theft cases. ### **Multi-Platform Reach: Windows and Android Users at Risk** Though the primary focus of the current campaign is macOS, the use of **Lumma Stealer** and **Marcher** in Windows and Android environments broadens the attack's scope. **Windows users** are tricked into downloading an MSI installer that deploys Lumma Stealer or **DeerStealer**, while **Android devices** receive an APK that installs the **Marcher banking trojan**, a malware designed to steal sensitive financial data. ### **How to Avoid FakeUpdate Malware Infections** To protect against these attacks, users should **never download files** or execute commands prompted by pop-ups or suspicious websites, especially those claiming to be browser updates, captchas, or fixes for common issues. In particular, avoid downloading any files from compromised sites that pretend to offer software updates. For those already infected with infostealers like FrigidStealer, it’s crucial to **change passwords** for all online accounts, particularly if the same password is used across multiple sites. **Two-factor authentication (2FA)** should be enabled wherever possible to add an additional layer of security.

loading..   21-Feb-2025
loading..   3 min read
loading..

Sandworm

Russian hackers exploit Signal’s "Linked Devices" to hijack accounts via QR phis...

In a chilling revelation, cybersecurity researchers have uncovered a sophisticated espionage campaign orchestrated by Russian state-aligned hackers exploiting one of the world’s most trusted encrypted messaging apps: **Signal**. A bombshell report from Google’s Threat Intelligence Group (GTIG) details how Kremlin-backed threat actors weaponized Signal’s “Linked Devices” feature to hijack accounts, monitor private conversations, and steal sensitive data—all without breaking the app’s encryption. ### **QR Code Trap: Phishing in Plain Sight** The attacks hinge on a deviously simple trick: **malicious QR codes**. Russian operatives, including the notorious Sandworm group (aka APT44), crafted fake invites, security alerts, and even military-grade software updates to dupe victims into scanning these codes. Once scanned, the QR code links the victim’s Signal account to a device controlled by the attacker, granting real-time access to messages, media, and contacts. _“This is the most novel and widely used technique in Russian-aligned attempts to compromise Signal accounts,”_ GTIG warned. The hackers tailored their approach based on the target: - **Broad campaigns** used fake Signal group invites or spoofed device-pairing instructions. - **Targeted attacks** lured victims with phishing pages mimicking specialized tools, such as Ukrainian military software. In one alarming case, Sandworm exploited devices seized on the **Ukraine battlefield**, syncing soldiers’ Signal accounts to Russian-controlled hardware to intercept battlefield communications. ### **Fake Group Chats, Real Spy Ops** GTIG exposed a Russian hacking collective, tracked as [UNC5792](https://cert.gov.ua/article/6278735), that created near-perfect replicas of Signal group invite pages. These pages, hosted on attacker-controlled servers, replaced legitimate “join group” links with code forcing victims to link their account to a hacker’s device. _“The fake invitations were indistinguishable from real ones,”_ researchers noted. When users clicked “accept,” they unknowingly handed over their Signal data to Russian spies. This group has ties to UAC-0195, a threat actor previously caught targeting **WhatsApp** accounts of diplomats and officials. ### **Ukrainian Military in Crosshairs-Kropyva Deception** Another Russia-linked group, UNC4221 (UAC-0185), targeted Ukrainian soldiers with a custom phishing kit impersonating **Kropyva**—a critical app used by Ukraine’s military for artillery guidance and minefield mapping. Hackers created a fake Signal verification page (*signal-confirm[.]site*) to mask the device-linking scam, while QR codes distributed via phishing emails synced victims’ accounts to Russian servers. ### **How Hackers Cover Their Tracks** Once linked, attackers used tools like **Infamous Chisel malware**, PowerShell scripts, and the **WAVESIGN batch script** to quietly extract Signal message databases from Android and Windows devices. GTIG warns that these breaches can go undetected for months, as Signal lacks tools to monitor unauthorized linked devices. _“The risk of prolonged compromise is extremely high,”_ researchers stressed. ### **Global Implications: Beyond Signal** The report highlights a broader Russian obsession with encrypted messaging apps. The **Coldriver** campaign, for example, recently targeted diplomats via WhatsApp. But Signal’s open-source framework and “Linked Devices” feature made it uniquely vulnerable to this phishing tactic. ### **How to Protect Yourself** GTIG and Signal urge users to: 1. **Update Signal immediately** (new patches block known phishing methods). 2. **Enable two-factor authentication** (prevents device linking without a PIN). 3. **Audit linked devices** regularly and remove unfamiliar ones. 4. **Never scan suspicious QR codes**—especially from unverified sources. ### **Encryption Isn’t Enough** This campaign exposes a harsh truth: even the most secure apps can be undermined by human error. As Russian hackers refine their social engineering tactics, the line between digital safety and catastrophe grows thinner. For high-risk users—journalists, soldiers, diplomats—the stakes have never been higher.

loading..   19-Feb-2025
loading..   3 min read
loading..

KBSE

US Army soldier pleads guilty to AT&T and Verizon hacks, U.S. Army soldier, plea...

US Army soldier pleads guilty to AT&T and Verizon hacks Cameron John Wagenius pleaded guilty to hacking AT&T and Verizon and stealing a massive trove of phone records from the companies, according to court records filed on Wednesday. Wagenius, who was a U.S. Army soldier, pleaded guilty to two counts of “unlawful transfer of confidential phone records information” on an online forum and via an online communications platform. According to a document filed by Wagenius’ lawyer, he faces a maximum fine of $250,000 and prison time of up to 10 years for each of the two counts. Wagenius was arrested and indicted last year. In January, U.S. prosecutors confirmed that the charges brought against Wagenius were linked to the indictment of Connor Moucka and John Binns, two alleged hackers whom the U.S. government accused of several data breaches against cloud computing services company Snowflake, which were among the worst hacks of 2024. Contact Us Do you have more information about the Snowflake hacks, or other related data breaches? From a non-work device and network, you can contact Lorenzo Franceschi-Bicchierai securely on Signal at +1 917 257 1382, or via Telegram and Keybase @lorenzofb, or email. You also can contact TechCrunch via SecureDrop. Last month, U.S. attorney Tessa Gorman told the court that both the AT&T and Verizon breaches “arise from the same computer intrusion and extortion and include some of the same stolen victim information.” She added that “these cases rely on overlapping evidentiary material and legal process and arguably present common questions of law and fact,” which effectively confirmed that Wagenius was involved in the Snowflake breaches. By hacking into Snowflake instances, hackers stole troves of data from AT&T, LendingTree, Santander Bank, Ticketmaster, and at least 160 other companies.

loading..   19-Feb-2025
loading..   2 min read