company logo

Product

Our Product

We are Reshaping the way Developers find and fix vulnerabilities before they get exploited.

Solutions

By Industry

BFSI

Healthcare

Education

IT & Telecom

Government

By Role

CISO/CTO

DevOps Engineer

Resources

Resource Library

Get actionable insight straight from our threat Intel lab to keep you informed about the ever-changing Threat landscape.

Subscribe to Our Weekly Threat Digest

Company

Contact Us

Have queries, feedback or prospects? Get in touch and we shall be with you shortly.

loading..
loading..
loading..
Loading...

Databreach

Hacker

loading..
loading..
loading..

Cybersecurity firm Stormshield Firewall Source Code Steal by Threat Actor

Cybersecurity firm Stormshield a key provider of network security products to the French government discloses that Threat Actor steal source code for Stormshie...

05-Feb-2021
3 min read

No content available.

Related Articles

loading..

Hijack

Cryptojacker

ansomware and infostealers dominate cybersecurity headlines, a lesser-known mena...

While ransomware and infostealers dominate cybersecurity headlines, a stealthier threat—**cryptojacking malware**—has quietly siphoned millions from unsuspecting victims. In a groundbreaking investigation, CyberArk Labs [uncovered](https://www.cyberark.com/resources/threat-research-blog/captain-massjacker-sparrow-uncovering-the-malwares-buried-treasure) **MassJacker**, a sophisticated cryptojacking operation linked to over **750,000 unique cryptocurrency wallets** and a single Solana wallet valued at **$300,000**. This deep dive reveals how cybercriminals exploit pirated software portals like **pesktop[.]com** to hijack crypto transactions, evade detection, and amass digital fortunes. ### **From Pirated Software to Crypto Theft** The MassJacker campaign begins on **pesktop[.]com**, a rogue site masquerading as a hub for pirated software. Users downloading "cracked" tools unwittingly execute a multi-stage attack: 1. **Initial Scripts**: A PowerShell script downloads three executables, including **[Amadey](https://malpedia.caad.fkie.fraunhofer.de/details/win.amadey)** (a notorious botnet) and two .NET payloads. 2. **Layered Obfuscation**: The 32-bit executable, **[PackerE](https://www.virustotal.com/gui/file/6e4c77942c7e64a1a250349099348a87736feb7c3667cfceec18a3d5364b2d98)**, decrypts a DLL (**PackerD1**) armed with five anti-analysis techniques, from **[JIT Hooking](https://github.com/mandiant/jitm)** to a **custom virtual machine (VM)**. 3. **Final Payload**: [PackerD1](https://www.virustotal.com/gui/file/48f071994095ffc179beeac7db3c70ef175f8551c6880e4b359b35c4752d4a78?nocache=1) loads **PackerD2**, which injects the MassJacker cryptojacker into **InstalUtil.exe**, a legitimate Windows process. The infection chain’s complexity—spanning PowerShell, .NET obfuscation, and process hollowing—underscores evolving malware tactics to bypass endpoint detection. ![Infection Chain Diagram](https://sb-cms.s3.ap-south-1.amazonaws.com/infection_chain_diagram_1ed960db18.png) ***Infection Chain (CyberArk)*** ### **Dark Art of Evasion** **1. JIT Hooking & Metadata Token Swapping** MassJacker’s **PackerD1** employs **JIT (Just-In-Time) Compiler Hooking**, dynamically altering function calls during runtime to thwart static analysis. Researchers observed functions like `StopMapper` being rewritten mid-execution (Figure 2), a technique previously linked to **MassLogger**, a malware-as-a-service (MaaS) tool. Metadata token mapping further obfuscates control flow, redirecting fields to malicious functions (e.g., `ObserverProducer`). **2. Custom Virtual Machine & String Obfuscation** The third resource in PackerD1 deploys a **custom VM** executing two scripts. The first manipulates stack values to alter program behavior, while the second decrypts PackerD1’s fourth resource—a string repository obfuscated with non-readable delimiters (Figure 8). These strings reveal the fifth resource, **PackerD2**, which loads the final payload. **3. Process Injection & Anti-Debugging** PackerD2 deserializes a configuration object (`_Bridge`) to disable security tools like **AMSI** and **ETW**. The payload, **MassJacker**, is injected into `InstalUtil.exe` and deploys infinite debugger-checking loops to resist analysis. ### **Cryptojacking Payload: How MassJacker Steals Your Crypto** MassJacker’s core functionality hinges on **clipboard hijacking**: - **Regex Surveillance**: Monitors clipboard activity for crypto addresses (Bitcoin, Ethereum, Solana, etc.). - **Wallet Replacement**: Swaps legitimate wallet IDs with attacker-controlled addresses from encrypted **recovery.dat** and **recoverysol.dat** files. - **C2 Infrastructure**: Downloads updated wallet lists from Command-and-Control servers, ensuring fresh addresses evade blocklists. ### **$300K Solana Heist: Following the Money Trail** CyberArk’s analysis uncovered **778,531 unique wallets**, but only 423 held funds. Key findings include: - **Motherlode Wallet**: Solana address `CJpe4dUcV5Knc2XZKTVsTNHm2MpmJGJNWCJdkfbNdYF5` held **600 SOL ($87,000)** and historically transacted **2,075 SOL ($300,000)**, including NFT trades (Figure 12). - **Cross-Chain Laundering**: Litecoin wallet `ltc1qcvt96u7ul76ha5m3rmy9ajn00avfkmsqpcfpsh` aggregated funds from multiple campaigns, suggesting centralized profit consolidation. - **Victim Testimonies**: Twitter users (e.g., @Achraf_yhy) reported funds siphoned to MassJacker wallets, linking the malware to real-world thefts. ### **Why Cryptojacking Remains Under the Radar** 1. Despite technical sophistication, MassJacker’s direct earnings are modest (~$30,000 after excluding cross-campaign funds). 2. Sandboxes often miss clipboard-focused malware, while static analysis fails to pinpoint cryptojacking intent. 3. Like **Amadey** and **MassLogger**, MassJacker is likely a MaaS tool, fragmenting attribution across threat actors. MassJacker’s discovery illuminates the dark underbelly of cryptojacking—a threat amplified by pirated software traps and evolving anti-analysis tech. For users, vigilance against unofficial downloads is critical. For researchers, decrypting malware like MassJacker offers treasure troves of threat intel, potentially unmasking criminal empires.

loading..   11-Mar-2025
loading..   4 min read
loading..

Outage

DDoS

Dark Storm hacktivists declare war on X with DDoS attacks, forcing Elon Musk to ...

The pro-Palestinian hacktivist collective **Dark Storm** has brazenly claimed responsibility for **coordinated DDoS attacks** that crippled X (formerly [Twitter](https://www.secureblink.com/cyber-security-news/400-million-twitter-users-data-allegedly-for-sale-on-dark-web-forum)) globally on Monday. The outages sparked panic among millions of users, prompting owner **Elon Musk** to confirm a _"massive cyberattack"_ while stopping short of naming the perpetrators. **Dark Storm**, a shadowy group notorious for targeting Israeli, European, and U.S. entities since its 2023 inception, flooded X’s servers with traffic, overwhelming its infrastructure. Screenshots and **check-host.net links** shared on their Telegram channel archived allegedly prove the attack’s ferocity—a tactic eerily reminiscent of **[Anonymous Sudan](https://www.secureblink.com/cyber-security-news/anonymous-sudan-admits-layer-7-d-do-s-attack-on-open-ai-s-chat-gpt)’s 2024 take-downs of [Microsoft](https://www.secureblink.com/cyber-security-news/unpatched-microsoft-office-zero-day-vulnerability-poses-data-leak-risk-1) and [Cloudflare](https://www.secureblink.com/cyber-security-news/cloudflare-r2-crash-disables-services-for-59-minutes-causing-13-6-log-loss)**. ### **Musk’s Cryptic Warning: A Country Could Be Involved** In a chilling post on X, Musk [warned](https://x.com/elonmusk/status/1899149509407473825) of a sophisticated assault: *“We get attacked every day, but this was done with a lot of resources. Either a large, coordinated group **and/or a country** is involved.”* The billionaire’s allusion to **state-sponsored actors** has ignited speculation about geopolitical motives. Is this retaliation for X’s content policies? A proxy strike in the Israel-Hamas war? Dark Storm’s Telegram posts glorify "resistance operations," but experts warn the group may be a front for **nation-state hackers**. --- ### **Cloudflare to the Rescue—But at What Cost?** X has now enabled **[Cloudflare](https://www.secureblink.com/cyber-security-news/cloudflare-mitigates-largest-recorded-d-do-s-attack-peaking-at-3-8-tbps)’s DDoS protection**, slamming the gates with aggressive CAPTCHA checks. Users report rampant disruptions, including the *help.x.com* portal being locked behind Cloudflare’s security—a desperate move revealing the platform’s vulnerability. - 🛑 **Global Reach**: Outages hit North America, Europe, and Asia—regions where X is a critical hub for real-time news. - 🔥 **Escalating Hacktivism**: Dark Storm’s attack mirrors **Anonymous Sudan’s 2024 rampage**, which U.S. authorities linked to Sudanese operatives. - 🌐 **Geopolitical Flashpoint**: With Dark Storm’s pro-Palestinian stance, experts fear this could ignite a **cyberwar spillover**. ### **Inside Dark Storm’s Playbook** The group’s modus operandi relies on botnets—armies of hijacked devices—to flood targets with junk traffic. Check-host.net data shared by Dark Storm shows requests spiking to 1.2 million per minute during the attack, a volume only achievable with elite resources. **Cybersecurity Analyst Jane Harper** warns: *"This isn’t script kiddies. The scale suggests **nation-state infrastructure** or a well-funded mercenary group. Cloudflare’s involvement is a Band-Aid—X remains a prime target."* **⚠️ Psychological Warfare: Fear, Uncertainty, Doubt** Dark Storm’s Telegram taunts weaponize **FUD (Fear, Uncertainty, Doubt)**: - “*X will fall. Prepare for the storm.*” - “*This is just the beginning.*” Such rhetoric fuels user anxiety, driving engagement—and ad revenue—for both attackers and platforms. X’s reliance on Cloudflare’s CAPTCHA walls now alienates legitimate users, a **lose-lose scenario** ripe for exploitation.

loading..   11-Mar-2025
loading..   3 min read
loading..

ODIS

NTT

Telecom Giant’s Fourth Major Cyber Incident Since 2020 Reflects Escalating Threa...

NTT Communications Corporation, a linchpin of Japan’s telecommunications network serving over 10 million businesses globally, has confirmed a catastrophic breach exposing sensitive data from 17,891 corporate clients. The incident, detected in February 2025, underscores systemic vulnerabilities in Japan’s critical infrastructure and ignites debate over corporate accountability in an era of relentless cyber warfare. ### **Breach Timeline: A Multi-Stage Attack** **5 February 2025**: - **Discovery**: NTT’s Security Operations Center (SOC) identified anomalous activity in its **Order Information Distribution System (OIDS)**, a centralized platform managing corporate client contracts, service details, and billing. Initial logs suggested unauthorized access via compromised administrative credentials. **6 February**: - **Containment**: NTT severed external connections to OIDS, isolating the system. Preliminary analysis confirmed data exfiltration but could not determine the breach’s origin point. **15 February**: - **Lateral Movement Detected**: Forensic investigators discovered threat actors had pivoted to a secondary device within NTT’s internal network—a legacy server running outdated Windows Server 2012 software. The server, reportedly scheduled for decommissioning in 2024, lacked critical security patches. - **Final Mitigation**: The device was disconnected, and NTT initiated a network-wide password reset and multi-factor authentication (MFA) rollout. **Ongoing Investigation**: - As of March 1, NTT’s third-party cybersecurity partner, Trend Micro, has yet to identify the initial access vector. Suspicion surrounds **phishing campaigns** targeting employees or **API vulnerabilities** in OIDS’s third-party integrations. ### **Compromised Data of Corporate Espionage** The OIDS breach exposed metadata critical for supply chain attacks: 1. **Corporate Identifiers**: Registered contract names, contract numbers, and service usage histories. 2. **Representative Details**: Full names, work phone numbers, and corporate email addresses. 3. **Operational Data**: Physical addresses linked to service installations and administrative contacts. **Exclusions**: - Consumer data, financial records, and NTT Docomo mobile contracts remained secure due to air-gapped systems. **Risk Assessment**: - **Kyocera Communications Systems**, a major NTT client, warned partners of potential phishing and Business Email Compromise (BEC) scams. Cybersecurity firm **CrowdStrike** noted that stolen metadata could fuel **tailored social engineering attacks** against supply chains. --- ### **NTT’s Controversial Response** **Communication Strategy**: NTT declined to issue personalized notifications, citing “operational impracticality” given the scale of impacted entities. A single public notice was posted to its website—a move condemned by experts. **Dr. Kenji Nakamura**, Director of the Japan Cyber Threat Intelligence Center (JCTIC), stated: > “Telecom providers are the backbone of national security. Opaque communication erodes stakeholder trust and hampers collective defense efforts.” **Operational Measures**: - Deployed **AI-driven endpoint detection** across all networks. - Partnered with **Palo Alto Networks** for real-time threat hunting. - Initiated a $200 million infrastructure modernization program targeting legacy systems. --- ### **Recurring Target** NTT’s cybersecurity struggles are well-documented: **May 2020**: - Hackers infiltrated NTT’s internal network via a compromised VPN, leaking data from 621 clients. **January 2025**: - A **state-sponsored DDoS attack** (attributed to **APT41** by private analysts) disrupted mobile services for 12 hours, costing an estimated $45 million in downtime. **Expert Analysis**: - **Motivations**: The 2025 breaches align with geopolitical tensions. APT41, linked to China, has historically targeted Japanese tech firms for intellectual property. - **Technical Weaknesses**: Aging IT infrastructure plagues Japan’s telecom sector. Over 40% of NTT’s servers ran unsupported OS versions in 2024, per a **METI report**. --- ### **Japan’s Accountability Gap** While Japan’s **Revised Personal Information Protection Act (2024)** mandates consumer breach disclosures, corporate data lacks equivalent safeguards. **Key Issues**: - **Notification Laws**: Unlike the EU’s GDPR, Japan imposes no deadlines or penalties for delayed corporate breach notifications. - **Critical Infrastructure Designation**: Telecoms remain excluded from Japan’s 2023 Critical Infrastructure Protection Act, limiting mandatory security protocols. **Political Reaction**: - **Takashi Fujiwara**, Minister of Internal Affairs, announced a parliamentary review of cyber laws, urging “urgent reforms to match evolving threats.” --- ### **A Case Study in Supply Chain Risk** The breach highlights vulnerabilities in third-party vendor ecosystems: **OIDS Integrations**: The compromised system linked to 14 third-party vendors, including cloud providers and billing platforms. - **MITRE ATT&CK Framework**: Investigators mapped the attack to **Tactics TA0007 (Lateral Movement)** and **Technique T1210 (Exploitation of Remote Services)**, emphasizing poor network segmentation. **Comparative Analysis**: Similar breaches at **British Telecom (2023)** and **Verizon (2022)** exploited third-party APIs, costing an average of $4.3 million per incident (IBM Cost of a Data Breach Report). --- ### **Stakeholder Reactions** **Corporate Clients**: - **Sony Group**: Conducting internal audits to assess exposure risks. - **Mitsubishi Corporation**: Demanded NTT subsidize cybersecurity upgrades for affected clients.

loading..   11-Mar-2025
loading..   4 min read