PlugX Malware Sneaks Onto Windows PCs Through USB Devices

By Deeba Ahmed
The new variant stood out among other malware because it can infect any attached removable USB device, e.g., floppy, flash, thumb drives, and any system the removable device is plugged into later.
This is a post from HackRead.com Read t… Continue reading PlugX Malware Sneaks Onto Windows PCs Through USB Devices

TA416 APT Rebounds With New PlugX Malware Variant

The TA416 APT has returned in spear phishing attacks against a range of victims – from the Vatican to diplomats in Africa – with a new Golang version of its PlugX malware loader. Continue reading TA416 APT Rebounds With New PlugX Malware Variant

Hackers Continue Cyberattacks Against Vatican, Catholic Orgs

The China-linked threat group RedDelta has continued to launch cyberattacks against Catholic institutions since May 2020 until as recently as last week. Continue reading Hackers Continue Cyberattacks Against Vatican, Catholic Orgs

APT Targeting Tibetans Packs Four Vulnerabilities in One Compromise

Tibetans along with journalists and human rights workers in Hong Kong and Taiwan have been targeted in campaigns using phishing emails laced with Microsoft RTF attachments that exploit four vulnerabilities. Continue reading APT Targeting Tibetans Packs Four Vulnerabilities in One Compromise

PlugX: Memory Forensics Lifecycle with Volatility

At OSDFCon last week, we discussed a case study showing how we identified manipulated memory artifacts in an infected environment. We were then able to rapidly introduce new capabilities to Volatility that could be used proactively in other environment… Continue reading PlugX: Memory Forensics Lifecycle with Volatility

PlugX: Memory Forensics Lifecycle with Volatility

At OSDFCon last week, we discussed a case study showing how we identified manipulated memory artifacts in an infected environment. We were then able to rapidly introduce new capabilities to Volatility that could be used proactively in other environment… Continue reading PlugX: Memory Forensics Lifecycle with Volatility