Npav Lab
-
A sophisticated phishing technique has been uncovered where attackers abuse Google’s OAuth system and DKIM verification to send emails that appear to come from no-reply@google.com, but actually lead users to fake support portals aimed at credential theft.
-
A highly advanced Android spyware operation has surfaced, posing as the official app of the Chinese Prosecutor’s Office. Dubbed SpyMax, this malware is part of the SpyNote family and is capable of hijacking nearly every aspect of an Android device—using deceptive UI tactics and exploiting accessibility services.
-
A massive cybercrime operation is targeting Indian investors with fake stock and crypto schemes. Hackers are using Telegram groups, fake mobile apps, and even compromised college websites to trick users, steal financial data, and siphon off crores in hard-earned money. With losses already crossing ₹50 crore, it's clear this is not just a scam—it’s a full-scale cyberattack.
-
Data poisoning is the new and silent evolution of ransomware that doesn’t lock your files — it changes them. From financial fraud to medical disasters, this dangerous cyberattack is designed to manipulate critical data, leaving businesses, hospitals, and governments confused, vulnerable, and unprepared.
-
A hacker identified as @303 has allegedly breached an Indian software company on December 19, 2024, leaking a massive dataset of sensitive policyholder and admin data from companies like HDFC Ergo, Bajaj Allianz, ICICI Lombard, and more. This breach adds to the growing wave of cyberattacks targeting India’s insurance industry.
-
Cybersecurity experts have uncovered a dangerous malware campaign where hackers mimic the Google Chrome install page to trick Android users into downloading a powerful spying tool called SpyNote. These fake pages look nearly identical to the real Google Play Store and are hosted on newly registered shady domains. When users fall for the trick and install the app, they unknowingly give hackers full control of their device.
-
An Indian Air Force (IAF) C-130J aircraft flying over Myanmar during the Operation Brahma relief mission was hit by a dangerous GPS-spoofing cyberattack. The attack could have misled the aircraft, but the pilots swiftly switched to an internal system to stay safe. Here's what happened and why GPS spoofing is a growing cyber threat.
-
A new email-based cyberattack tricks users into either giving away their Office365 login details or installing malware disguised as a Microsoft app. The attack uses trusted platforms like files.fm to appear legitimate and targets businesses and professionals using a double-threat strategy.
-
A dangerous new malware named GIFTEDCROOK is targeting Ukrainian government systems. Disguised in phishing emails, this malware is designed to steal sensitive browser data and exfiltrate it through Telegram, making it hard to detect. Cybersecurity experts are warning that this attack is part of a growing trend in cyber-espionage by threat actors.
-
The infamous Vidar Stealer malware has returned with a dangerous new trick—pretending to be Microsoft’s BGInfo.exe, a tool trusted by IT professionals. This new version is designed to silently steal browser cookies, stored passwords, and crypto wallet data.