Bringing Threat Data to you, As it happens

Keep up with New Threat intel Data, Incident Reports, Cybersecurity
updates, and other malicious activities.

7.2 million records were exposed, but not from the BHIM app

CloudSEK analysts provide details and facts related to the report that may have caused several BHIM users to panic unnecessarily.

2.9 crore Indian jobseeker’s data that leaked could be outdated

CloudSEK researchers reveal the names of users who dumped the data and the timestamps of the files that confirms the data is old.

Malicious crypto miners compromise academic data centers

Academic data centers across Europe, North America, and China suffered a string of attacks that may have been carried out to mine Monero.

Watch out for Android SMS worm that hides in Fake Jio data offers

The fake Jio message is linked to a shared Android Package file which when executed, generates ad revenue, gains access to contacts.

Leaked WHO user credentials resurface on popular trading forum

Email addresses and passwords of 6835 WHO employees resurface on Nulled. These credentials were also posted on Pastebin, last month.

Custom malware Kaiji targets IoT devices via SSH brute forcing

Chinese origin botnet, Kaiji, built from scratch in the Golang language, can launch multiple DDoS attacks, SSH bruteforcer, SSH spreader.

Phishing campaigns use “account activity alerts” to trick HSBC and Apple customers

Businesses use SMS, email to authenticate transactions, send payment reminders, etc. And, crooks are taking advantage of this.

Customized malware “Asnarök” targets firewalls

SQL vulnerability in Sophos firewall products, allows remote code execution, used for a coordinated attack on Sophos and its customers.

Ghost Squad Hackers targets Govt. of India Clean Money initiative website

The hacker group displays a message, on the website, directed to its members. The message claims that the group’s administrator, S1ege, hacked the site

Threat actors pose as Indian govt. to spread malware laced COVID email attachments

The email orders organizations to review the attachment and submit their plan of action to combat Coronavirus, much similar to APT36’s pattern of attack.

Be informed about these Threats

Sign up now to our Threat intelligence Newsletter and be the first to know about these threats first in your inbox.