Loading...
Loading...
Browse all stories on DeepNewz
VisitWhat will be identified as the primary method of delivering Voldemort and Latrodectus malware by end of 2024?
Phishing emails • 25%
Malicious websites • 25%
Compromised software updates • 25%
Other • 25%
Cybersecurity reports or official statements from cybersecurity firms
Cyber Espionage Campaign Uses Google Sheets for Malware Control, Involves Voldemort, Latrodectus, Targets China
Sep 2, 2024, 03:12 AM
A sophisticated cyber espionage campaign has been identified, exploiting Google Sheets for malware control. The campaign is suspected to be an espionage effort, utilizing a combination of novel tactics and advanced malware, including 'Voldemort' and 'Latrodectus'. These malware variants are designed to enhance evasion and control, posing significant threats to global organizations. The attack, which includes a phishing campaign delivering AsyncRAT and Infostealer, has been observed targeting Windows systems and is reportedly run from and aimed at China. The malware is particularly focused on stealing passwords and personal data, highlighting the increasing complexity and danger of modern cyber threats.
View original story
Cloud services • 25%
Email phishing • 25%
Social engineering • 25%
Other • 25%
Phishing • 25%
RDP exploits • 25%
RMM tools • 25%
Other • 25%
Phishing emails • 25%
Compromised software downloads • 25%
Malicious websites • 25%
Other • 25%
Phishing • 25%
Zero-day exploits • 25%
Malware • 25%
Other • 25%
Nearest Neighbor Attack • 25%
Phishing • 25%
Malware • 25%
Other • 25%
Phishing • 25%
Direct network attack • 25%
Malware installation • 25%
Other • 25%
Phishing attacks • 25%
Direct server exploitation • 25%
Malware distribution • 25%
Other • 25%
Polyfill.io service • 33%
Compromised WordPress plugins • 33%
Both equally • 33%
Router vulnerabilities • 25%
Camera vulnerabilities • 25%
Other internet-connected devices • 25%
Unknown/Multiple methods • 25%
Phishing • 25%
Password spraying • 25%
Exploiting Git configurations • 25%
Malware • 25%
Phishing emails • 25%
Malware • 25%
Social engineering • 25%
Other • 25%
Energy sector • 25%
Financial sector • 25%
Transportation sector • 25%
Other • 25%
Yes • 50%
No • 50%
No • 50%
Yes • 50%
No • 50%
Yes • 50%
Financial sector • 25%
Technology companies • 25%
Government agencies • 25%
Healthcare sector • 25%