Cyber Attack
-
A massive cybercrime operation is targeting Indian investors with fake stock and crypto schemes. Hackers are using Telegram groups, fake mobile apps, and even compromised college websites to trick users, steal financial data, and siphon off crores in hard-earned money. With losses already crossing ₹50 crore, it's clear this is not just a scam—it’s a full-scale cyberattack.
-
A hacker identified as @303 has allegedly breached an Indian software company on December 19, 2024, leaking a massive dataset of sensitive policyholder and admin data from companies like HDFC Ergo, Bajaj Allianz, ICICI Lombard, and more. This breach adds to the growing wave of cyberattacks targeting India’s insurance industry.
-
An Indian Air Force (IAF) C-130J aircraft flying over Myanmar during the Operation Brahma relief mission was hit by a dangerous GPS-spoofing cyberattack. The attack could have misled the aircraft, but the pilots swiftly switched to an internal system to stay safe. Here's what happened and why GPS spoofing is a growing cyber threat.
-
A new email-based cyberattack tricks users into either giving away their Office365 login details or installing malware disguised as a Microsoft app. The attack uses trusted platforms like files.fm to appear legitimate and targets businesses and professionals using a double-threat strategy.
-
A dangerous new malware named GIFTEDCROOK is targeting Ukrainian government systems. Disguised in phishing emails, this malware is designed to steal sensitive browser data and exfiltrate it through Telegram, making it hard to detect. Cybersecurity experts are warning that this attack is part of a growing trend in cyber-espionage by threat actors.
-
A dangerous phishing campaign is targeting businesses that advertise on Meta platforms like Facebook and Instagram. Hackers are sending fake emails claiming that users’ ad accounts have been suspended due to policy violations. These emails trick victims into clicking malicious links that steal login credentials and grant attackers full control over their accounts.
-
The Babuk2 ransomware group has been caught making false extortion demands by recycling stolen data from past cyberattacks. Instead of launching new breaches, Babuk2 is repurposing data from older incidents and pressuring victims into paying ransoms for information that has already been leaked.
-
Hackers have launched a new attack using fake hotel and travel booking websites to spread LummaStealer malware. Disguised as legitimate booking confirmation pages, these fraudulent sites trick users into running harmful commands that compromise their personal and financial information.
-
Cybercriminals are using fake file conversion tools to infect users' devices with malware. The FBI has issued an urgent warning about free Word to PDF converters that secretly install malicious software, leading to identity theft, ransomware attacks, and data breaches.
-
Cybercriminals have developed a new malware attack that hides harmful software inside JPEG image files, allowing them to steal passwords from unsuspecting victims. By using steganography, a technique that hides data inside images, hackers can bypass security defenses and infect devices.