Cyber Defense Advisors

Year: 2024

  • by
  • May 1, 2024

Bitcoin Forensic Analysis Uncovers Money Laundering Clusters and Criminal Proceeds

A forensic analysis of a graph dataset containing transactions on the Bitcoin blockchain has revealed clusters associated with illicit activity and money laundering, including detecting criminal proceeds sent to a crypto exchange and previously unknown wallets belonging to a Russian darknet market. The findings come from Elliptic in collaboration with researchers from the MIT-IBM Watson […]

Cyber News
  • by
  • May 1, 2024

Android Malware Wpeeper Uses Compromised WordPress Sites to Hide C2 Servers

Cybersecurity researchers have discovered a previously undocumented malware targeting Android devices that uses compromised WordPress sites as relays for its actual command-and-control (C2) servers for detection evasion. The malware, codenamed Wpeeper, is an ELF binary that leverages the HTTPS protocol to secure its C2 communications. “Wpeeper is a typical backdoor Trojan for Android systems, supporting […]

Cyber News
  • by
  • May 1, 2024

AI Voice Scam

Scammers tricked a company into believing they were dealing with a BBC presenter. They faked her voice, and accepted money intended for her. Tags: artificial intelligence, scams, social engineering Sidebar photo of Bruce Schneier by Joe MacInnis.  

Cyber News
  • by
  • May 1, 2024

How to Make Your Employees Your First Line of Cyber Defense

There’s a natural human desire to avoid threatening scenarios. The irony, of course, is if you hope to attain any semblance of security, you’ve got to remain prepared to confront those very same threats. As a decision-maker for your organization, you know this well. But no matter how many experts or trusted cybersecurity tools your […]

Cyber News
  • by
  • May 1, 2024

ZLoader Malware Evolves with Anti-Analysis Trick from Zeus Banking Trojan

The authors behind the resurfaced ZLoader malware have added a feature that was originally present in the Zeus banking trojan that it’s based on, indicating that it’s being actively developed. “The latest version, 2.4.1.0, introduces a feature to prevent execution on machines that differ from the original infection,” Zscaler ThreatLabz researcher Santiago Vicente said in […]

Cyber News
  • by
  • May 1, 2024

Ex-NSA Employee Sentenced to 22 Years for Trying to Sell U.S. Secrets to Russia

A former employee of the U.S. National Security Agency (NSA) has been sentenced to nearly 22 years (262 months) in prison for attempting to transfer classified documents to Russia. “This sentence should serve as a stark warning to all those entrusted with protecting national defense information that there are consequences to betraying that trust,” said […]

Cyber News

Ransomware Crisis Escalates

Ransomware Crisis Escalates Attacks Surged A Whopping 33% In 2023 Brace yourself for a cyber shocker: “Attempted ransomware attacks on organizations rose 33% worldwide last year. About 1 in 20 organizations in the US fell victim to attempted ransomware attacks.” – Check Point Research It’s no secret: the U.S. is squarely in the middle of […]

Cyber Thoughts

Ransomware Protection Strategies That Work

Ransomware Protection Strategies That Work Ransomware attacks are growing both in frequency and sophistication. Implementing robust defensive strategies is more crucial than ever. Here’s how specific measures can effectively combat these cyber threats: 1. Regular Software Updates: Many ransomware attacks exploit software vulnerabilities. Regular updates patch these vulnerabilities, closing gaps that attackers use to infiltrate […]

Cyber Thoughts
  • by
  • April 30, 2024

Millions of Malicious ‘Imageless’ Containers Planted on Docker Hub Over 5 Years

Cybersecurity researchers have discovered multiple campaigns targeting Docker Hub by planting millions of malicious “imageless” containers over the past five years, once again underscoring how open-source registries could pave the way for supply chain attacks. “Over four million of the repositories in Docker Hub are imageless and have no content except for the repository documentation,” […]

Cyber News