New Python-Based Malware “Legion” Includes AWS Credential Harvesting and SMTP Hijacking Capabilities

On April 13, 2023, Cado Labs researchers reported the technical details of a new malware they dubbed “Legion.” Context According to the report, Legion is written in Python and includes credential harvesting and SMTP hijacking capabilities. Researchers reported that the tool is currently being sold on Telegram. Technical Details According to researchers, key features of…

Read More

RH-ISAC Offers Events and Programs Around the Globe

As the ISAC for the global retail and hospitality sectors, RH-ISAC will host several in-person events in Europe this quarter to continue to serve companies that have a strong presence in the region, including Nestlé, Ahold Delhaize, Natural &Co, Tesco, and Danone. Additionally, RH-ISAC has programming to serve cybersecurity personnel in the Asia-Pacific market and…

Read More

UPDATE: Mandiant Initial Analysis of 3CXDesktopApp Supply Chain Attack Confirms North Korean Threat Actor

Context On April 11, 2023, 3CX released the initial results of Mandiant’s incident response and investigation into the supply chain attack that compromised 3CXDesktopApp. According to the report, the activity is attributable to the North Korean threat group UNC4736. Technical Details According to Mandiant: “the attacker infected targeted 3CX systems with TAXHAUL (AKA “TxRLoader”) malware….

Read More

New Report Outlines Challenges in CTI for CISOs and Cyber Leaders

Context On April 6, 2023, CSO reported on a research report from ESG on the challenges that face cyber security leaders when making decisions based on cyber threat intelligence. According to the report, “95% of enterprise organizations (those with more than 1,000 employees) have a threat intelligence budget, and 98% plan to increase spending on…

Read More

New “OpcJacker” Malware Includes Infostealing and Crypto Wallet Replacing Capabilities

Context On March 29, 2023, Trend Micro security researchers reported a new malware they named “OpcJacker.” According to the report, OpcJacker includes multiple capabilities such as: Keylogging Taking screenshots Stealing sensitive data from browsers Loading additional modules Replacing cryptocurrency addresses in the clipboard for hijacking purposes Trend Micro researchers assessed that: The primary objective of…

Read More