Experts claim that OceanLotus’s campaign is actively using web archive files in its attacks that involves web archive file laden with a malicious Word doc. The malware collects different information, such as network adapter, a list of system directories and files, username, computer name, and checks other processes. Experts recommend organizations leverage the provided IoCs for detecting and preventing active attacks.
- Next story Sony Reminds Microsoft of Activision Obligation
- Previous story 2022 Top CISO Concerns: Remote work, ransomware, and more
Popular Tags
Android (256)
Attack (561)
attacks (529)
breach (305)
computer security (763)
Cyber (449)
cyber attacks (769)
cyber news (809)
Cybersecurity (776)
cyber security news (809)
cyber security news today (809)
cyber security updates (809)
cyber updates (809)
Data (719)
data breach (820)
Google (335)
Hacker (324)
hacker news (996)
Hackers (513)
hacking (552)
hacking news (753)
how to hack (753)
information security (782)
Malware (780)
Microsoft (396)
Million (317)
network security (773)
News (377)
penetration testing (252)
Phishing (447)
Privacy (362)
Ransomware (1070)
ransomware malware (753)
security (1107)
software vulnerability (753)
spyware (300)
Tech (336)
the hacker news (754)
tools (294)
Twitter (386)
users (297)
vulnerabilities (474)
Vulnerability (297)
Windows (372)
ZDNet (274)