Are there Indicators of Attack or Indicators of Compromise (IoA, IoC) or suspicious events specific to stalkerware?

By stalkerware I mean the type of spyware that is typically marketed as a tool to catch a cheating spouse (or similar).
I am asking because the motive for this type of attack is somewhat different from other attacks. If the goal of an atta… Continue reading Are there Indicators of Attack or Indicators of Compromise (IoA, IoC) or suspicious events specific to stalkerware?

What’s with this seemingly nonsensical Bitcoin "hack" story about a kid with 400 BTC live on his malware-infested PC?

I read this very strange story yesterday, and I really need to ask about it:

Hackers knew that everyone would be staring at the sun and away from their computers, so they chose that precise moment to pounce. Erik watched the eclipse like … Continue reading What’s with this seemingly nonsensical Bitcoin "hack" story about a kid with 400 BTC live on his malware-infested PC?

How did SolarWinds get hacked? And was the Orion update put out without human approval?

Obviously there is massive information about the SolarWinds Orion hack itself of the malicious DLL injected into the update: https://www.fireeye.com/blog/threat-research/2020/12/evasive-attacker-leverages-solarwinds-supply-chain-compromise… Continue reading How did SolarWinds get hacked? And was the Orion update put out without human approval?