Skip to content
  Thursday 15 January 2026
Trending
August 21, 2025manager, cybersecurity CSOC March 3, 2025Product Manager – Industrial Cybersecurity October 24, 2024<h3>CISA Pushes for Stronger Security in Bulk Data Sales</h3> January 11, 2024Apache OfBiz Vulnerability: New PoC Exploit Poses Risk to ERP Systems August 14, 2023Latin American Users Targeted by New Financial Malware ‘JanelaRAT’ December 2, 2025Payments CTC Cybersecurity Architect – Vice President May 5, 2025<h3>AI-Driven App Development Races Ahead of Cybersecurity Measures!</h3> March 2, 2025Cybersecurity Engineer February 28, 2025Specialist, Systems Engineering – Cybersecurity August 4, 2025NVIDIA Triton Bug Alert: Unauthenticated Attackers Can Hijack AI Servers with Code Execution
Mister Cybersecurity
  • Home
  • News
    • Daily Update
    • Industry News
    • Threat Advisories
  • Simulators
    • Exam Simulators
      • CompTIA Security+
      • CompTIA Advanced Security Practitioner (CASP+)
      • Certified Ethical Hacker (CEH)
      • Certified Information Systems Security Professional (CISSP)
      •  Certified Information Systems Auditor (CISA)
      • Certified Information Security Manager (CISM)
      • Systems Security Certified Practitioner (SSCP)
      • GIAC Security Essentials Certification (GSEC)
      • GIAC Certified Incident Handler (GCIH)
      • Offensive Security Certified Professional (OSCP)
    • Training Simulators
      • Blue Team Simulator
      • Red Team Simulator
  • Tools
    • VulnVisor – Vulnerability Explorer
    • Takedown Request Generator
    • Dark Coder – Auto Code Generator
    • SKY VPN
  • Courses
    • SQL Injection Fundamentals with Kali Linux
    • Web Application Hacking
    • Session Hijacking
    • DoS & DDoS Attacks for Beginners
    • Cryptography for Cybersecurity & Hacking
    • Evasion Tactics – IDS, Firewalls & Honeypots
  • Tutorials
    • Security
    • Malware
    • Virus
    • Social Media Security
    • Wireless Security
    • Linux
    • Privacy
    • Windows
      • Windows 11
    • Android
    • iPhone
  • Software
    • Antivirus
    • Android APK
    • Best Free VPN
    • Encryption Tools
    • Hacking Tools
    • Network Utilities
    • Pentesting Tools
    • Themes and Skins
    • Operating Systems
  • More
    • Alternative Sites
    • Cloud Storage
    • Chrome OS
    • Encryption
    • Email Security
    • Ethical Hacking Books
    • Firewall
    • Hacking
    • Web
    • Ransomware
  • Careers
  • Store
  • Account
    • Log In
    • Your Profile
    • Membership Billing
    • Membership Account
Mister Cybersecurity
Mister Cybersecurity
  • Home
  • News
    • Daily Update
    • Industry News
    • Threat Advisories
  • Simulators
    • Exam Simulators
      • CompTIA Security+
      • CompTIA Advanced Security Practitioner (CASP+)
      • Certified Ethical Hacker (CEH)
      • Certified Information Systems Security Professional (CISSP)
      •  Certified Information Systems Auditor (CISA)
      • Certified Information Security Manager (CISM)
      • Systems Security Certified Practitioner (SSCP)
      • GIAC Security Essentials Certification (GSEC)
      • GIAC Certified Incident Handler (GCIH)
      • Offensive Security Certified Professional (OSCP)
    • Training Simulators
      • Blue Team Simulator
      • Red Team Simulator
  • Tools
    • VulnVisor – Vulnerability Explorer
    • Takedown Request Generator
    • Dark Coder – Auto Code Generator
    • SKY VPN
  • Courses
    • SQL Injection Fundamentals with Kali Linux
    • Web Application Hacking
    • Session Hijacking
    • DoS & DDoS Attacks for Beginners
    • Cryptography for Cybersecurity & Hacking
    • Evasion Tactics – IDS, Firewalls & Honeypots
  • Tutorials
    • Security
    • Malware
    • Virus
    • Social Media Security
    • Wireless Security
    • Linux
    • Privacy
    • Windows
      • Windows 11
    • Android
    • iPhone
  • Software
    • Antivirus
    • Android APK
    • Best Free VPN
    • Encryption Tools
    • Hacking Tools
    • Network Utilities
    • Pentesting Tools
    • Themes and Skins
    • Operating Systems
  • More
    • Alternative Sites
    • Cloud Storage
    • Chrome OS
    • Encryption
    • Email Security
    • Ethical Hacking Books
    • Firewall
    • Hacking
    • Web
    • Ransomware
  • Careers
  • Store
  • Account
    • Log In
    • Your Profile
    • Membership Billing
    • Membership Account
Mister Cybersecurity
  Industry News  Discover 80% of Targets Located in Russia!
Industry News

Discover 80% of Targets Located in Russia!

SecuredyouadmSecuredyouadm—December 27, 20240
FacebookTwitterPinterestLinkedInTumblrRedditVKWhatsAppEmail
More stories

Free Tools to Test Website Accessibility

June 22, 2025

Campaign Targets Linux SSH Servers with Poor Management

December 27, 2023

JumpCloud Amplifies Security with VaultOne PAM & Compliance Upgrade

May 20, 2025

Maximizing the Potential of Duet AI in Google Docs

November 7, 2023



In 2024, the threat actor known as Cloud Atlas has been identified using a new malware called VBCloud in cyber attack campaigns targeting multiple users. According to Kaspersky researcher Oleg Kupreev, victims are infected through phishing emails containing a malicious document that exploits a vulnerability in the formula editor (CVE-2018-0802) to download and execute malware code. The majority of targets were located in Russia, with some victims in Belarus, Canada, Moldova, Israel, Kyrgyzstan, Turkey, and Vietnam.

Cloud Atlas, also known as Clean Ursa, Inception, Oxygen, and Red October, is an unattributed threat activity cluster that has been active since 2014. The group has been linked to cyber attacks in Russia, Belarus, and Transnistria, using a PowerShell-based backdoor named PowerShower. In 2023, spear-phishing attacks targeting entities in Russia exploited an old Microsoft Office Equation Editor flaw (CVE-2017-11882) to drop a Visual Basic Script (VBS) payload, leading to the discovery of VBShower, PowerShower, and VBCloud.

The attack chain begins with a phishing email containing a malicious Microsoft Office document that downloads a malicious template in the form of an RTF file from a remote server. This template exploits CVE-2018-0802 to run an HTML Application (HTA) file, which in turn creates the VBShower backdoor. This backdoor includes a loader and a cleaner to cover up evidence of malicious activity.

VBShower is designed to retrieve VBS payloads from a command-and-control (C2) server, while PowerShower downloads and executes PowerShell scripts from the C2 server. PowerShower can also serve as a downloader for ZIP archive files. As many as seven PowerShell payloads have been observed by Kaspersky, each carrying out distinct tasks such as conducting dictionary attacks and obtaining credentials for Active Directory accounts.

VBCloud operates similarly to VBShower but uses public cloud storage for C2 communications. The malware collects information about the system, harvests specific file types, and probes the local network for further infiltration. The ultimate goal of the infection chain is to steal data from victims’ devices. The complex attack chain highlights the sophisticated tactics used by threat actors like Cloud Atlas to carry out cyber attacks and data theft.



Source link

FacebookTwitterPinterestLinkedInTumblrRedditVKWhatsAppEmail

Securedyouadm

As an original author, I would like to discuss the importance of mental health and well-being in today’s society. In recent years, there has been a growing awareness and recognition of the impact that mental health has on our overall quality of life. It is crucial for individuals to prioritize their mental health just as much as their physical health.

One key aspect of mental health is self-care. Taking time to prioritize self-care activities such as exercise, meditation, and relaxation can greatly improve mental well-being. It is important to listen to our bodies and minds and give them the care and attention they need to thrive.

Another important aspect of mental health is seeking help when needed. There is no shame in reaching out to a therapist or counselor for support during challenging times. Talking to a professional can provide valuable insights and coping strategies for managing stress and mental health issues.

Additionally, building strong social connections and maintaining healthy relationships is crucial for mental well-being. Surrounding ourselves with supportive and caring individuals can help us navigate life’s challenges and provide a sense of belonging and connection.

In conclusion, prioritizing mental health and well-being is essential for living a fulfilling and balanced life. By practicing self-care, seeking help when needed, and nurturing healthy relationships, we can cultivate a strong foundation for our mental health and overall well-being. It is important to remember that mental health is just as important as physical health, and should be treated with the same level of care and attention.
Cybersecurity Analyst
Related posts
  • Related posts
  • More from author
Industry News

5 Reasons AI-Driven Business Need Dedicated Servers – SmartData Collective

October 14, 20250
Industry News

The Future of Cyberthreat Sharing Post-CISA 2015: What’s Next?

October 1, 20250
Industry News

Meta Strikes $14.2B AI Deal with CoreWeave for Cutting-Edge Infrastructure

October 1, 20250
Load more
Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Read also
Careers

Cybersecurity Analyst

January 14, 20260
Careers

Lead Cybersecurity – SOX

January 14, 20260
Careers

Senior Cloud Security Engineer, AVP – BXTI Cybersecurity

January 14, 20260
Careers

Sr. Cybersecurity Analyst, Compliance

January 14, 20260
Careers

Cybersecurity Analyst

January 14, 20260
Careers

CYBERSECURITY ANLST SR

January 14, 20260
Load more
Stay Social!
192Likes
4,500Followers
13Subscribers
46Followers
Recent posts
  • Cybersecurity Analyst
  • Lead Cybersecurity – SOX
  • Senior Cloud Security Engineer, AVP – BXTI Cybersecurity
  • Sr. Cybersecurity Analyst, Compliance
  • Cybersecurity Analyst

    # TRENDING

    how old is my computerhow old is my dell laptophow old is my HP laptophow old is my laptophow old is my toshiba laptophow to find computer ageverify computer agestar wars theme wallpapersThe Best Hacking Bookswiresharkusb device not found windows 10/11usb device not recognized windows 10/11 errorWhat is AIGPUSnifferuTorrentvulnerability scanner downloadWifi Hacking SoftwareWifi Hacking Appsolved windows 10/11 usb device not recognizedstar wars windows 7 theme downloadTwitter Account Security
    © Copyright Mister Cybersecurity LLC 2023, All Rights Reserved
    • About
    • Contact
    • Privacy
    • ToS
    • Disclosures