📱 𝐑𝐚𝐧𝐬𝐨𝐦𝐇𝐚𝐰𝐤: A New Threat Targeting Businesses
Key Features:
⟶ RansomHawk targets critical infrastructures and steals data before encryption.
⟶ Active since September 2024, it is distributed through targeted phishing campaigns.
⟶ Confirmed spread in Europe and Asia.
Malicious Features:
⟶ Asymmetric encryption with a robust RSA key.
⟶ Double extortion: sensitive data is published if the ransom is not paid.
📂 𝐀𝐭𝐭𝐚𝐜𝐤𝐬 via Malicious Office Macros
Technique Used:
⟶ Word documents containing macros enabled by default.
⟶ The macros download payloads, including Trojans.
Final Objective:
⟶ Remote control of machines for data exfiltration.
💰 𝐅𝐢𝐧𝐓𝐫𝐚𝐩: Fraudulent Investment Applications
Context:
⟶ Over 10 million victims reported in 2024.
⟶ These applications promise high returns and manipulate stock prices.
Threats:
⟶ Total loss of invested funds and theft of financial information.
User Advice:
⟶ Verify the licenses of investment platforms before use.
⟶ Avoid applications with no reviews or excessive permissions.
🛠️ 𝐃𝐢𝐬𝐦𝐚𝐧𝐭𝐥𝐢𝐧𝐠 Sophisticated Scam Networks
Operation VENUS:
⟶ Network dismantled by Europol, involved in social engineering scams.
⟶ Over 150 arrests across 10 countries.
Global Impact:
⟶ Significant reduction in the impact of these scams.
⟶ Enhanced collaboration between international agencies.
🛰️ 𝐂𝐲𝐛𝐞𝐫𝐚𝐭𝐭𝐚𝐜𝐤𝐬 Targeting Autonomous Drones
Recent Incident:
⟶ Multiple military drones compromised through vulnerabilities in their APIs.
Implications:
⟶ Critical missions jeopardized and strategic data leaked.