L'Épidémie Silencieuse des SMS-Blasters

https://peer.adalta.social/w/oWqFG8omZXU4RKW8CHHeDV

L'Épidémie Silencieuse des SMS-Blasters

PeerTube
The IMSI-Catcher Fraud Nexus

PeerTube

Die SMS-Blaster-Affäre von Paris

https://peer.adalta.social/w/q1wKUvjSj3Vdu1jU5Hq3uq

Die SMS-Blaster-Affäre von Paris

PeerTube

Hausse Alarmante des Infractions en Saxe

https://peer.adalta.social/w/s5FxHTVSQ7BtZZR5Nj2m1h

Hausse Alarmante des Infractions en Saxe

PeerTube

The Saxon Surge in Traffic Offenses

https://peer.adalta.social/w/8hfmLCmdPx1AAsTsSTWJqG

Verkehrssünder-Boom im Freistaat

https://peer.adalta.social/w/bjQR9XT1YQj5a1bpKqBZ9f

Verkehrssünder-Boom im Freistaat

PeerTube

A Slopoly start to AI-enhanced ransomware attacks

IBM X-Force discovered a likely AI-generated malware named 'Slopoly' used in a ransomware attack by the Hive0163 group. This marks the beginning of AI adoption among cybercrime groups, potentially transforming the threat landscape. Slopoly, while relatively unsophisticated, demonstrates how easily threat actors can use AI to develop new malware quickly. The attack involved ClickFix social engineering, NodeSnake malware, and InterlockRAT, culminating in the deployment of Interlock ransomware. This incident highlights the growing trend of AI-generated and AI-integrated malware, which could lead to more ephemeral and difficult-to-attribute attacks, challenging traditional threat intelligence methods.

Pulse ID: 69b934133afeb115e5169568
Pulse Link: https://otx.alienvault.com/pulse/69b934133afeb115e5169568
Pulse Author: AlienVault
Created: 2026-03-17 10:59:31

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

#CyberCrime #CyberSecurity #InfoSec #Malware #OTX #OpenThreatExchange #RAT #RCE #RansomWare #SocialEngineering #bot #AlienVault

LevelBlue - Open Threat Exchange

Learn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.

LevelBlue Open Threat Exchange

New backdoor targeting Ukrainian entities with possible links to Laundry Bear

A new campaign targeting Ukrainian entities has been identified, attributed to actors linked to Russia. The campaign uses judicial and charity-themed lures to deploy a JavaScript-based backdoor called DRILLAPP, which runs through the Edge browser. This backdoor enables various actions including file manipulation, microphone access, and webcam capture. Two variants of the campaign have been observed, with the second variant introducing additional capabilities. The attackers utilize the browser's capabilities to evade detection and gain access to sensitive resources. The campaign shares tactics with a previously reported Laundry Bear operation, leading to a low-confidence attribution to this group.

Pulse ID: 69b934921c208cec80c35f6c
Pulse Link: https://otx.alienvault.com/pulse/69b934921c208cec80c35f6c
Pulse Author: AlienVault
Created: 2026-03-17 11:01:38

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

#BackDoor #Browser #CyberSecurity #Edge #ICS #InfoSec #Java #JavaScript #OTX #OpenThreatExchange #RAT #RCE #Russia #UK #Ukr #Ukrainian #bot #AlienVault

LevelBlue - Open Threat Exchange

Learn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.

LevelBlue Open Threat Exchange

L'Exploitation Silencieuse de l'Information

https://peer.adalta.social/w/pF68mbRwEaLf4tpLZiisPK

L'Exploitation Silencieuse de l'Information

PeerTube
The Attribution Vacuum

PeerTube