Skip to content
  Sunday 10 December 2023
Trending
April 20, 2023CISA Releases One Industrial Control Systems Advisory January 3, 2022AirJack (Packet Injection Software) Free Download January 13, 2022How to Recover Your WiFi Password from Android Device 2022 July 20, 2023CISA Releases Cybersecurity Advisory on Threat Actors Exploiting Citrix CVE-2023-3519 April 21, 2023Cisco Releases Security Advisories for Multiple Products October 29, 2023Cybersecurity Specialist November 2, 2023Cybersecurity Engineer – Cloud SOC/CASB (Remote) January 3, 2022How To Fix Android Flashlight Not Working? 11 Easy Solutions 2022 January 4, 2022Download PSN Resolver 2022 – #1 PlayStation IP Grabber/Puller January 5, 20229 Best Putlocker Alternative Sites in 2022 – Watch Free Movies
Mister Cybersecurity
  • Home
  • News
    • Daily Update
    • Industry News
    • Threat Advisories
  • Simulators
    • Exam Simulators
      • CompTIA Security+
      • CompTIA Advanced Security Practitioner (CASP+)
      • Certified Ethical Hacker (CEH)
      • Certified Information Systems Security Professional (CISSP)
      •  Certified Information Systems Auditor (CISA)
      • Certified Information Security Manager (CISM)
      • Systems Security Certified Practitioner (SSCP)
      • GIAC Security Essentials Certification (GSEC)
      • GIAC Certified Incident Handler (GCIH)
      • Offensive Security Certified Professional (OSCP)
    • Training Simulators
      • Blue Team Simulator
      • Red Team Simulator
  • Tools
    • VulnVisor – Vulnerability Explorer
    • Takedown Request Generator
    • Dark Coder – Auto Code Generator
    • SKY VPN
  • Courses
    • SQL Injection Fundamentals with Kali Linux
    • Web Application Hacking
    • Session Hijacking
    • DoS & DDoS Attacks for Beginners
    • Cryptography for Cybersecurity & Hacking
    • Evasion Tactics – IDS, Firewalls & Honeypots
  • Tutorials
    • Security
    • Malware
    • Virus
    • Social Media Security
    • Wireless Security
    • Linux
    • Privacy
    • Windows
      • Windows 11
    • Android
    • iPhone
  • Software
    • Antivirus
    • Android APK
    • Best Free VPN
    • Encryption Tools
    • Hacking Tools
    • Network Utilities
    • Pentesting Tools
    • Themes and Skins
    • Operating Systems
  • More
    • Alternative Sites
    • Cloud Storage
    • Chrome OS
    • Encryption
    • Email Security
    • Ethical Hacking Books
    • Firewall
    • Hacking
    • Web
    • Ransomware
  • Careers
  • Store
  • Account
    • Log In
    • Your Profile
    • Membership Billing
    • Membership Account
Mister Cybersecurity
Mister Cybersecurity
  • Home
  • News
    • Daily Update
    • Industry News
    • Threat Advisories
  • Simulators
    • Exam Simulators
      • CompTIA Security+
      • CompTIA Advanced Security Practitioner (CASP+)
      • Certified Ethical Hacker (CEH)
      • Certified Information Systems Security Professional (CISSP)
      •  Certified Information Systems Auditor (CISA)
      • Certified Information Security Manager (CISM)
      • Systems Security Certified Practitioner (SSCP)
      • GIAC Security Essentials Certification (GSEC)
      • GIAC Certified Incident Handler (GCIH)
      • Offensive Security Certified Professional (OSCP)
    • Training Simulators
      • Blue Team Simulator
      • Red Team Simulator
  • Tools
    • VulnVisor – Vulnerability Explorer
    • Takedown Request Generator
    • Dark Coder – Auto Code Generator
    • SKY VPN
  • Courses
    • SQL Injection Fundamentals with Kali Linux
    • Web Application Hacking
    • Session Hijacking
    • DoS & DDoS Attacks for Beginners
    • Cryptography for Cybersecurity & Hacking
    • Evasion Tactics – IDS, Firewalls & Honeypots
  • Tutorials
    • Security
    • Malware
    • Virus
    • Social Media Security
    • Wireless Security
    • Linux
    • Privacy
    • Windows
      • Windows 11
    • Android
    • iPhone
  • Software
    • Antivirus
    • Android APK
    • Best Free VPN
    • Encryption Tools
    • Hacking Tools
    • Network Utilities
    • Pentesting Tools
    • Themes and Skins
    • Operating Systems
  • More
    • Alternative Sites
    • Cloud Storage
    • Chrome OS
    • Encryption
    • Email Security
    • Ethical Hacking Books
    • Firewall
    • Hacking
    • Web
    • Ransomware
  • Careers
  • Store
  • Account
    • Log In
    • Your Profile
    • Membership Billing
    • Membership Account
Mister Cybersecurity
  Industry News  Critical Infrastructure: The Playground of Nation-State Hackers
Industry News

Critical Infrastructure: The Playground of Nation-State Hackers

SecuredyouadmSecuredyouadm—October 17, 20230
FacebookTwitterPinterestLinkedInTumblrRedditVKWhatsAppEmail
More stories

AI in Healthcare: A Promising Advancement with Limitations

October 8, 2023

Business Safety: Your Comprehensive Guide

December 6, 2023

Revolutionizing Football Performance Analysis: The Impact of Data Collection on Unleashing Victory

September 2, 2023

Get SaaS Essential Third-Party Risk Management with this Free Solution

November 30, 2023



Nation-state hacking groups are now leveraging the social platform Discord to target critical infrastructure. Discord has become a popular target for hosting malware and allowing information stealers to access sensitive data. While the platform is mostly used by information stealers that can be easily obtained online, cybersecurity firm Trellix found evidence of an artifact targeting Ukrainian critical infrastructures, although it is not linked to a known threat group. The artifact is a Microsoft OneNote file distributed via email, pretending to be from a non-profit organization. Once opened, it tricks recipients into clicking on a button that executes a script to download another PowerShell script from a GitHub repository. The final payload uses a Discord webhook to exfiltrate system metadata. Trellix’s analysis also revealed that loaders like SmokeLoader, PrivateLoader, and GuLoader, as well as malware families such as RedLine, Vidar, Agent Tesla, and Umbral, are commonly using Discord’s content delivery network (CDN) to download next-stage payloads. Additionally, malware families like Mercurial Grabber, Stealerium, Typhon Stealer, and Venom RAT have been observed using Discord webhooks. The adaptability of cybercriminals to exploit communication platforms like Discord showcases the risk to critical infrastructure and sensitive data.



Source link

FacebookTwitterPinterestLinkedInTumblrRedditVKWhatsAppEmail

Securedyouadm

Suspected Sandworm Hackers Take Aim at Ukrainian Telcos
Rockwell Automation FactoryTalk Linx | CISA
Related posts
  • Related posts
  • More from author
Industry News

Unattractive Trends in Health Data Breach: A Look into 2023

December 9, 20230
Industry News

Europe Achieves a Regulatory Milestone as it Reaches a Deal on AI Act

December 9, 20230
Industry News

Black Hat Europe 2023: A Call for Collaborative Efforts

December 9, 20230
Load more
Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Read also
Careers

Linux Cybersecurity Engineer

December 10, 20230
Careers

Linux Cybersecurity Engineer

December 10, 20230
Careers

Comcast Cybersecurity: Security Engineer 3

December 10, 20230
Industry News

Unattractive Trends in Health Data Breach: A Look into 2023

December 9, 20230
Industry News

Europe Achieves a Regulatory Milestone as it Reaches a Deal on AI Act

December 9, 20230
Industry News

Black Hat Europe 2023: A Call for Collaborative Efforts

December 9, 20230
Load more
Stay Social!
192Likes
4,500Followers
13Subscribers
46Followers
Recent posts
  • Linux Cybersecurity Engineer
  • Linux Cybersecurity Engineer
  • Comcast Cybersecurity: Security Engineer 3
  • Unattractive Trends in Health Data Breach: A Look into 2023
  • Europe Achieves a Regulatory Milestone as it Reaches a Deal on AI Act

    # TRENDING

    how old is my dell laptophow old is my toshiba laptophow to find computer agehow old is my laptophow old is my computerhow old is my HP laptopverify computer ageWhat is AIGPUSnifferuTorrentwiresharkstar wars theme wallpapersvulnerability scanner downloadTopusb device not recognized windows 10/11 errorWifi Hacking SoftwareWifi Hacking Appstar wars windows 7 theme downloadstar wars windows 10 theme downloadTop Android Hacking AppsThe Best Hacking Books
    © Copyright Mister Cybersecurity LLC 2023, All Rights Reserved
    • About
    • Contact
    • Privacy
    • ToS
    • Disclosures