Monthly Archives: March 2025
-
A dangerous banking trojan named Anatsa (TeaBot) was found hiding in a File Manager and Document Reader app on Google Play. Before it was removed, the app had over 220,000 downloads and targeted users worldwide. This malware steals banking passwords, bypasses two-factor authentication (2FA), and enables hackers to transfer money from victims' accounts.
-
Cybercriminals have found a new way to trick companies into paying fake ransoms – by sending physical letters in the mail. Instead of hacking networks or deploying ransomware, fraudsters are simply claiming they have stolen sensitive data and demanding money to prevent its release.
-
A dangerous new version of the Android Remote Access Tool (RAT), called AndroRAT, is being used by hackers to steal unlock patterns, PINs, and passcodes from Android devices. Originally an open-source university project in 2012, AndroRAT has now evolved into a powerful malware that bypasses security defenses up to Android 15. This latest variant spreads through fake apps and phishing links, using advanced techniques to hijack device controls, steal biometric data, and break into locked smartphones.
-
Indian tech giant Tata Technologies, a key player in automotive and aerospace engineering, has allegedly fallen victim to a massive ransomware attack. The Hunters International ransomware group claims to have stolen 1.4 TB of sensitive data, potentially impacting major clients like Ford, McLaren, Honda, and Airbus.
-
A new phishing campaign is targeting Windows users with a deceptive technique called ClickFix, tricking victims into executing malicious PowerShell commands. The attack, active since March 2025, deploys a modified version of the Havoc command-and-control (C2) framework through SharePoint abuse, allowing attackers to take full control of compromised systems.
-
Angel One, a leading financial services platform, has confirmed a data breach impacting 8 million users after hackers gained unauthorized access to its Amazon Web Services (AWS) resources. The breach was discovered when dark web monitoring alerts signaled potential data leakage. While the company acted quickly to secure its systems, concerns remain about how the breach occurred and its long-term implications.