SpyAgent malware targets crypto wallets by stealing screenshots

A new Android malware strain known as SpyAgent is making the rounds — and stealing screenshots as it goes. Using optical character recognition (OCR) technology, the malware is after cryptocurrency recovery phrases often stored in screenshots on user devices. Here’s how to dodge the bullet. Attackers shooting their (screen) shot Attacks start — as always […]

The post SpyAgent malware targets crypto wallets by stealing screenshots appeared first on Security Intelligence.

Continue reading SpyAgent malware targets crypto wallets by stealing screenshots

In the midst of restructuring, Guardian Healthcare hit by ransomware attack

A recent article on the cybersecurity risks posed by mergers and acquisitions begins: When companies merge, it creates significant cybersecurity challenges in two main ways: firstly, challenges arise in integrating disparate security infrastructures, a… Continue reading In the midst of restructuring, Guardian Healthcare hit by ransomware attack

QSC: A multi-plugin framework used by CloudComputating group in cyberespionage campaigns

Kaspersky shares details on QSC modular cyberespionage framework, which appears to be linked to CloudComputating group campaigns. Continue reading QSC: A multi-plugin framework used by CloudComputating group in cyberespionage campaigns

Industrial companies in Europe targeted with GuLoader

A recent spear-phishing campaign targeting industrial and engineering companies in Europe was aimed at saddling victims with the popular GuLoader downloader and, ultimately, a remote access trojan that would permit attackers to steal information from a… Continue reading Industrial companies in Europe targeted with GuLoader

North Korean hackers employ new tactics to compromise crypto-related businesses

North Korean hackers are targeting crypto-related businesses with phishing emails and novel macOS-specific malware. The crypto-related phishing campaign Since July 2024, phishing emails seemingly containing helpful information on risks related to the r… Continue reading North Korean hackers employ new tactics to compromise crypto-related businesses