Fake reporters from APT42 harvest credentials

Gone Phishing Banner

Welcome to Gone Phishing, your daily cybersecurity newsletter thatโ€™s gotta catch โ€˜em all! ๐Ÿฃ๐Ÿฒ๐Ÿ‘พ

Todayโ€™s hottest cybersecurity news stories:

  • ๐Ÿ“ฐ Jour-no, thanks! Fake reporters from APT42 harvest credentials ๐Ÿ‘จโ€๐ŸŒพ

  • ๐Ÿ”ฎ Can you guess who it is yet? Tonight, Matthew, I am Dmitry Khoroshev ๐Ÿ•ต๐Ÿปโ€โ™‚๏ธ

  • ๐ŸŽƒ Bleepy Hollowโ€ฆ Hijack loader employs process โ€˜hollowingโ€™, UAC bypass ๐Ÿšง

Hackers: Iโ€™m in the APT, yeah you know me! ๐ŸŽค๐Ÿ“€๐Ÿ”ฅ

๐Ÿšจ Iranian Hackers Targeting NGOs and Media Outlets! ๐Ÿ•ต๏ธโ€โ™‚๏ธ

In a recent report by Mandiant, it's been revealed that APT42, a notorious Iranian hacking group, is up to their old tricks again. This time, they're using advanced social engineering schemes to breach target networks and cloud environments. ๐Ÿ˜ฑ

Who's in the Crosshairs? ๐ŸŽฏ

Targets of these cyberattacks include Western and Middle Eastern NGOs, media organisations, academia, legal services, and activists. APT42 is cleverly posing as journalists and event organisers to build trust with their victims, delivering invitations to conferences or legit documents in the process. ๐Ÿ“ฐโœ‰๏ธ

What's the Game Plan? ๐Ÿค”

Once they've gained a victim's trust, APT42 harvests credentials to sneak into cloud environments. From there, they covertly snatch sensitive data and exfiltrate it back to Iran. ๐Ÿ˜ˆ But here's the kicker: they're doing it all while flying under the radar using built-in features and open-source tools. ๐Ÿ•ต๏ธโ€โ™‚๏ธ๐Ÿ”’

APT42 Unmasked! ๐ŸŽญ

First identified in September 2022, APT42 is affiliated with Iran's Islamic Revolutionary Guard Corps (IRGC). They're a subset of another notorious group, APT35. While APT35 focuses on long-term, malware-heavy operations, APT42 zeroes in on specific individuals and organisations to serve Iran's domestic and foreign interests. ๐ŸŒ๐Ÿ”“

Stay Vigilant, Stay Safe! ๐Ÿ›ก๏ธ

As APT42's cyber espionage campaigns evolve, it's crucial to stay one step ahead. Watch out for phishing emails and suspicious links, and always beef up your cybersecurity defences. Together, we can keep our networks secure! ๐Ÿ’ช

They done him Dmitry ๐Ÿ’€๐Ÿ’€๐Ÿ’€ Tbf, he was chomping at the LockBit ๐Ÿ˜ฌ

๐Ÿšจ UK NCA Busts LockBit Ransomware Mastermind! ๐Ÿ’ฃ

In a stunning turn of events, the UK National Crime Agency (NCA) has unveiled the face behind the notorious LockBit ransomware operation. Meet Dmitry Yuryevich Khoroshev, a 31-year-old Russian national who's been wreaking havoc in the digital realm. ๐Ÿ˜ฑ๐Ÿ•ต๏ธโ€โ™‚๏ธ

The Man, The Myth ๐ŸŽญ

Khoroshev, also known as LockBitSupp and putinkrab, has been slapped with sanctions from the U.K., U.S., and Australia for his nefarious deeds. With over 2,500 decryption keys in hand, authorities are reaching out to LockBit victims to offer support and bring justice to those affected. ๐Ÿ”๐Ÿ’ฐ

Charges Galore! โš–๏ธ

The Department of Justice (DoJ) has dropped a whopping 26 charges on Khoroshev, including conspiracy to commit fraud, extortion, and intentional damage to protected computers. If convicted, he could be staring down the barrel of a 185-year prison sentence. ๐Ÿ˜ฑ๐Ÿ’ผ

The LockBit Legacy ๐ŸŒ

LockBit, once a titan in the ransomware underworld, has been dismantled thanks to a coordinated operation dubbed Cronos. Despite attempts to resurface, their global threat has been significantly diminished, with only 69 active affiliates remaining. Victory for cyber defenders everywhere! ๐Ÿ›ก๏ธ๐ŸŽ‰

๐ŸŽฃ Catch of the Day!! ๐ŸŒŠ๐ŸŸ๐Ÿฆž

Stay ahead of the curve with Presspool.ai! ๐Ÿš€ Subscribe to their newsletter for the latest buzz in the information technology space, with a special focus on AI. Their slogan says it all: "Actionable marketing insights for the visionary AI executive." ๐Ÿค“๐Ÿ’ก Thatโ€™s us, alright! ๐Ÿคต How about you? Visionary AI executive, much? ๐Ÿ‘€

And if the newsletter gets your motor running then you can take a butchers at their cool AI marketing product too which is sure to help you make the most of our new artificial overlords and put them to work for your business ๐Ÿค–๐Ÿ‘ฉโ€๐Ÿ’ป๐ŸŒ

Rest assured, the process is very straightforward.

You simply:

๐Ÿ†• Sign Up & Create Campaign

๐Ÿ“Š Define your audience, budget, and message to captivate your audience.

๐Ÿš€ Launch your campaign, as Presspoolโ€™s AI matches it with ideal newsletter audiences for optimal reach and conversions. ๐ŸŽฏ

๐Ÿ•ต๏ธ Finally, you leverage real-time analytics to track performance and refine future strategies. ๐Ÿ“ˆ Elevate your marketing game and stay informed with Presspool.ai! ๐ŸŒŸ Simples! ๐Ÿฆฆ

Presspool.ai ๐Ÿ“ฐ๐ŸŠ๐Ÿค– may just have what you need to succeed. And if the product isnโ€™t for you, the newsletter alone is a gamechanger. And we know newsletters ๐Ÿ˜‰

Hijack? Bye Jack! ๐Ÿ™ƒ

๐Ÿšจ Hijack Loader Malware Evolves with Stealthier Tactics! ๐Ÿ›ก๏ธ

A revamped version of the notorious malware loader, Hijack Loader, is making waves with its upgraded stealth capabilities. According to Zscaler ThreatLabz researcher Muhammed Irfan V A, this latest iteration boasts enhanced anti-analysis tricks to slip past detection systems unnoticed. ๐Ÿ•ต๏ธโ€โ™‚๏ธ๐Ÿ”’

A Closer Look at Hijack Loader: ๐Ÿฆ 

Originally dubbed IDAT Loader, Hijack Loader first emerged on the cyber scene back in September 2023. Since then, it's been the go-to conduit for various malware families, including Amadey, Lumma Stealer, and Remcos RAT, among others. ๐Ÿ˜ฑ๐Ÿ’ป

PNG Decryption Technique Unveiled! ๐Ÿ–ผ๏ธ

What sets this new version apart is its ingenious use of a PNG image to decrypt and load the next-stage payload. This technique, pioneered by Morphisec, adds another layer of complexity to the malware's operation, making it even trickier to detect. ๐ŸŽจ๐Ÿ”“

The Arms Race Continues! ๐Ÿ’ฅ

As cyber threats evolve, so too must our defences. With malware campaigns on the rise, it's crucial to stay vigilant against emerging threats like Hijack Loader. But fear not! Together, we can outsmart even the most cunning cyber adversaries. ๐Ÿ›ก๏ธ๐ŸŒ

Stay tuned for more updates as the cybersecurity saga unfolds! ๐Ÿ’ป๐Ÿ”’

๐Ÿ—ž๏ธ Extra, Extra! Read all about it! ๐Ÿ—ž๏ธ

Every few weeks, we carefully select three hot newsletters to show you. Reputation is everything, so any links we share come from personal recommendation or carefully researched businesses at the time of posting. Enjoy!

  • ๐Ÿ›ก๏ธ Tl;dr sec: Join 30,000+ security professionals getting the best tools, blog posts, talks, and resources right in their inbox for free every Thursday ๐Ÿ“…

  • ๐Ÿ’ต Crypto Pragmatist: Crypto made simple. Actionable alpha in 5 minutes, 3x a week. Join 47,000+ investors and insiders, for ๐Ÿ†“

  • ๐Ÿ“ˆ Bitcoin Breakdown: The best in Bitcoin, carefully curated by an alien from the future ๐Ÿ‘พ

Let us know what you think.

So long and thanks for reading all the phish!

Give us a rating?

Login or Subscribe to participate in polls.

footer graphic cyber security newsletter