Tuesday, May 5, 2026
HomeTagsCybercriminals

Tag: Cybercriminals

Cybercriminals Exploit PoshC2, Chisel, and Classroom Spy in Crafting Their Attack Infrastructure

Recent cybersecurity research from Unit 42, Palo Alto Networks’ threat intelligence team, has uncovered a sophisticated cybercriminal operation targeting financial organizations across Africa. Dubbed CL-CRI-1014, this threat cluster has been active since at least July 2023, leveraging a blend of open-source and publicly available...

Cybercriminals Manipulate Search Engines, Leveraging ChatGPT and Luma AI Trends to Distribute Malicious Payloads

In a striking escalation of cybercrime tactics, threat actors are now exploiting the surging popularity of artificial intelligence tools, such as ChatGPT and Luma AI, to weaponize search engine results and deliver advanced malware to unsuspecting victims. A recent investigation by Zscaler’s ThreatLabz has...

Cybercriminals Use VBScript to Deploy Masslogger Credential Stealer Malware

Security researchers at Seqrite Labs have uncovered a new wave of sophisticated cyberattacks where cybercriminals utilize encoded VBScript (.VBE) files as the initial infection vector for deploying the Masslogger credential stealer malware. This campaign exemplifies the evolving threat landscape, with attackers leveraging advanced, multi-stage, fileless...

Cybercriminals Exploit ClickFix Method to Spread Remote Access Trojans and Data-Siphoning Malware

Security researchers have recently uncovered a worrying surge in cyberattacks leveraging the “ClickFix” technique, a sophisticated social engineering method designed to trick users into unwittingly executing malicious code on their own devices. According to the latest intelligence from Elastic Security Labs, cybercriminals are increasingly...

Cybercriminals Use Clever HTML Technique to Bait Outlook Users into Dangerous Clicks

A lesser-known but highly effective cyberattack method has resurfaced, targeting unsuspecting users through a sophisticated manipulation of HTML in phishing emails. Security analysts have revealed how cybercriminals are exploiting conditional HTML comments originally intended for backward compatibility and rendering differences to show benign links...