Security researchers uncovered a sophisticated cyber-espionage campaign targeting multiple organizations in Malaysia, demonstrating a highly organized and modular attack operation. The campaign relied on attacker-controlled infrastructure hosted on a Microsoft Azure virtual machine located in the Malaysia West region. Researchers discovered a wide collection of custom tools and scripts used to orchestrate attacks, including tailored Python utilities, exploit chains, webshell deployment tools, and private command-and-control (C2) source code. The threat actors showed strong operational discipline by creating purpose-built scripts for each victim and function. These scripts performed network enumeration, database access, credential usage, and data preparation activities before moving information outside compromised environments. Certain tools leveraged administrator-level WinRM access and embedded Microsoft SQL credentials to execute PowerShell commands directly against internal systems, allowing attackers to interact with sensitive environments efficiently while reducing the need for direct manual intervention. The campaign also targeted externally accessible systems and government portals through multiple exploitation techniques. Researchers identified scripts capable of abusing exposed RPC ASP endpoints to execute remote Windows commands via crafted HTTP requests. The attackers additionally used credential lists containing targeted passwords, suggesting pre-attack reconnaissance and victim-specific planning. A key characteristic of the campaign was the use of trusted cloud infrastructure to disguise malicious activity. The intrusion escalated significantly in at least one compromised environment, resulting in full domain compromise. Researchers discovered stolen Windows registry hives, including SAM, SECURITY, SYSTEM files, and NTDS database dumps extracted from domain controllers. These artifacts can enable offline extraction of password hashes and Active Directory credentials using tools such as Mimikatz, granting attackers opportunities for long-term persistence, lateral movement, and future re-entry into networks. Additional findings included exploitation of a Malaysian mobile operator through a chained Laravel remote code execution technique that combined multiple deserialization gadget chains.
Android users are being targeted in a large-scale malware operation designed to silently enroll victims into premium mobile billing services without consent. The campaign abuses ca...
U.S. and Canadian law enforcement agencies have detained an alleged operator connected to the KimWolf botnet, a cybercrime platform known for conducting large-scale DDoS attacks us...
A newly identified Phishing-as-a-Service (PhaaS) platform named Kali365 is actively targeting Microsoft 365 users by abusing OAuth device authentication flows to bypass multi-facto...