M00nD3v, HawkEye threat actor, sells malware after COVID-19 diagnosis

Key Points The information-stealing malware dubbed M00nD3v Logger was recently auctioned off on Hack Forums,  together with HakwEye Reborn.   The threat actor – operating under the alias “M00nD3v” – states that they so… Continue reading M00nD3v, HawkEye threat actor, sells malware after COVID-19 diagnosis

Fake Email from WHO Installs Malware

An email seemingly from the General Director of the World Health Organization, Dr. Tedros Adhanom Ghebreyesus, contains a new HawkEye malware variant, designed to steal valuable information from infected computers. The attackers are using the current C… Continue reading Fake Email from WHO Installs Malware

Revamped HawkEye Keylogger Swoops in on Coronavirus Fears

Emails claiming to be directly from WHO’s Dr. Tedros Adhanom Ghebreyesus offer “drug advice” — and malware infections. Continue reading Revamped HawkEye Keylogger Swoops in on Coronavirus Fears

Hawkeye enters into a Cooperative Research and Development Agreement with the DOD

Hawkeye, a next-generation imaging technology company, recently announced that it has entered into a Cooperative Research and Development Agreement (CRADA) with the Department of Defense (DOD). The CRADA agreement marks a pivotal milestone for Hawkeye … Continue reading Hawkeye enters into a Cooperative Research and Development Agreement with the DOD

HawkEye Attack Wave Sends Stolen Data to Another Keylogger Provider

A recent attack wave involving HawkEye malware sends data stolen from its victims to another keylogger provider’s website. On 21 May, My Online Security came across a new sample of HawkEye. The actual delivery mechanism itself wasn’t unique… Continue reading HawkEye Attack Wave Sends Stolen Data to Another Keylogger Provider

Malspam Campaigns Distribute HawkEye Keylogger Post Ownership Change

After the HawkEye malware kit underwent an ownership change and new development, researchers are spotting the keylogger used in several malicious email campaigns. Continue reading Malspam Campaigns Distribute HawkEye Keylogger Post Ownership Change

One Nigerian man’s simple phishing campaign drains thousands from corporate coffers

One Nigerian man, working alone and using old malware, launched an email-based malware campaign that successfully stole thousands of dollars from manufacturing, banking and construction companies around the world. A new report from CheckPoint Technologies spotlights a low-sophistication campaign of business email compromise (BEC) attacks against 4,000 global companies in the last four months. Security researchers say they traced the attacks back to a single individual in his mid-20s aiming infect target networks, steal data and commit fraud. The thousands of attempts have resulted in 14 companies being infected. Nigerian and international law enforcement were informed a month ago, CheckPoint threat intelligence manager Maya Horowitz told CyberScoop, but it’s not clear if any action has been taken. The attacker uses the phrase “get rich or die trying” on social media accounts, the researchers said, lending that name to the case study. The attacker uses fake emails appearing to come from Saudi Aramco, the second-largest daily oil […]

The post One Nigerian man’s simple phishing campaign drains thousands from corporate coffers appeared first on Cyberscoop.

Continue reading One Nigerian man’s simple phishing campaign drains thousands from corporate coffers