Npav Lab
-
As tensions escalate in the wake of the Pahalgam attack, India’s digital frontline is now under coordinated cyber assault. The government’s Computer Emergency Response Team (CERT-In) has issued urgent advisories, calling for heightened vigilance across banks, strategic sectors, and private enterprises. The increased threat environment has prompted a nationwide effort—public and private—to fortify cyber defenses under Operation Sindoor.
-
A deeply embedded backdoor in Magento extensions has surfaced after six years, affecting 500 to 1,000 e-commerce websites—including a $40 billion multinational. The long-dormant malware has now been activated, compromising sensitive customer data in a widespread supply chain attack.
-
In a chilling example of cyber exploitation, threat actors are leveraging the tragic Pahalgam attack to deceive Indian government personnel into opening malicious documents. These phishing campaigns aim to install Remote Access Trojans (RATs) and extract sensitive intelligence data from highly sensitive departments.
-
A new wave of subscription-based scams is flooding the internet, using fake online stores, deceptive pricing, and social media ads to steal users’ credit card details and charge them repeatedly — all under the guise of “exclusive memberships.”
-
In a recent high-impact ransomware incident, a reputed biopharmaceutical company in Pune’s Hinjawadi IT hub has fallen victim to a crippling cyberattack. The attackers have demanded a ransom of $80,000 (₹68 lakh) in exchange for unlocking sensitive encrypted data, effectively halting the firm's operations for over 48 hours.
-
A newly surfaced ransomware group, RansomHub, is aggressively targeting corporate environments using an advanced, multi-stage infection chain that combines initial access malware with strategic network infiltration tactics. Cybersecurity researchers warn that this Ransomware-as-a-Service (RaaS) group poses a serious threat to global organizations by leveraging deceptive update prompts and stealthy backdoors.
-
A stealthy new cyberattack campaign is using steganography and a legacy Microsoft Office vulnerability to deliver AsyncRAT — a powerful remote access trojan capable of full system compromise. This multi-stage campaign cleverly embeds malicious code in innocent-looking image files, using advanced evasion tactics to bypass traditional security solutions.
-
Cyber attackers are now weaponizing Google Forms—an otherwise legitimate tool—to craft highly convincing phishing campaigns that evade email security filters and steal user logins. Trusted domains and smart obfuscation tactics make these threats harder to detect and more dangerous than ever.
-
A newly uncovered Magecart campaign is compromising online shopping platforms using stealthy JavaScript to silently harvest customers' credit card data. This multi-phase attack uses advanced obfuscation, real-time data exfiltration, and persistent backdoor access to remain undetected and devastatingly effective.
-
A 28-year-old man from Maharashtra fell victim to a stealthy and advanced cyberattack after downloading a seemingly innocent image on WhatsApp. The scam, which didn't involve any suspicious links or OTPs, highlights a disturbing new threat vector that exploits hidden malware embedded in image files.