Cybercrime, false RFQ carries a BluStealer campaignThe compressed attachment of the “REQUEST FOR QUOTATION” email contains an exe: the malware. Stolen… Cybercrime, false RFQ carries a BluStealer campaign7 June 2023NimbusCyber, Defence and Security The compressed attachment of the “REQUEST FOR QUOTATION” email contains an exe: the malware. Stolen data is exfiltrated via Telegram API.
Cybercrime, Blustealer campaign from Lithuania simulating ChinaThe compressed attachment of the “Order_list_30052023” message contains an exe file: the malware. Stolen data… Cybercrime, Blustealer campaign from Lithuania simulating China31 May 2023Francesco BussolettiCyber, Defence and Security The compressed attachment of the “Order_list_30052023” message contains an exe file: the malware. Stolen data is exfiltrated via Telegram API.
Cybercrime, false invoice request from UK is the bait for BluStealerThe compressed attachment of the “Order-Urgent” email contains an exe file – the malware. The… Cybercrime, false invoice request from UK is the bait for BluStealer16 May 2023Francesco BussolettiCyber, Defence and Security The compressed attachment of the “Order-Urgent” email contains an exe file – the malware. The stolen data is exfiltrated via Telegram API.
Cybercrime, a “Purchase Order” email from Lebanon carries BlustealerThe compressed attachment contains an exe file: the malware. Stolen data is exfiltrated via Telegram… Cybercrime, a “Purchase Order” email from Lebanon carries Blustealer9 May 2023Francesco BussolettiCyber, Defence and Security The compressed attachment contains an exe file: the malware. Stolen data is exfiltrated via Telegram API.
Cybercrime: here it comes Atomic, a new info-stealer for macOSThe malware, aka AMOS, is sold with a $1,000-a-month subscription and can be used even… Cybercrime: here it comes Atomic, a new info-stealer for macOS3 May 2023Francesco BussolettiCyber, Defence and Security The malware, aka AMOS, is sold with a $1,000-a-month subscription and can be used even by those without technical skills.
Cybercrime, fake purchase order from Finland bait for BlueStealerThe compressed attachment of the "Purchase Order" email contains an exe: the malware. Stolen data… Cybercrime, fake purchase order from Finland bait for BlueStealer13 April 2023Francesco BussolettiCyber, Defence and Security The compressed attachment of the "Purchase Order" email contains an exe: the malware. Stolen data is exfiltrated via Telegram API.
Cybercrime, the BlueStealer campaign from the UAE changes its templateThe attachment of the new "Document approval" email contains an exe: the malware. The stolen… Cybercrime, the BlueStealer campaign from the UAE changes its template7 April 2023Francesco BussolettiDefence and Security, Restricted Area The attachment of the new "Document approval" email contains an exe: the malware. The stolen data is always exfiltrated to the same Telegram API C2.
Cybercrime, Bluestealer goes through a “Request for quotation” from the UAEThe gz attachment contains an exe: the malware (aka DarkCloud). The stolen data is exfiltrated… Cybercrime, Bluestealer goes through a “Request for quotation” from the UAE5 April 2023Francesco BussolettiCyber, Defence and Security The gz attachment contains an exe: the malware (aka DarkCloud). The stolen data is exfiltrated via Telegram API.
Cybercrime, BluStealer is back with a campaign on Purchase OrderThe gz attachment of a fake email from the UAE contains an exe file: the… Cybercrime, BluStealer is back with a campaign on Purchase Order22 February 2023Francesco BussolettiCyber, Defence and Security The gz attachment of a fake email from the UAE contains an exe file: the malware. The stolen data is then exfiltrated via Telegram API.
Cybercrime, Raccoon Stealer hidden in a fake complaint about a purchaseThe link points to a page from which you download an xll file: the loader.… Cybercrime, Raccoon Stealer hidden in a fake complaint about a purchase26 January 2023Francesco BussolettiCyber, Defence and Security The link points to a page from which you download an xll file: the loader. This then in turn downloads a zip with the malware inside.