Recent reports indicate that suspected Chinese-linked hackers are targeting Taiwan's critical infrastructure using advanced techniques such as web shells and open-source tools. The Hacker News highlighted the UAT-5918 campaign, which aims to exploit vulnerabilities in systems. Additionally, researchers from Trend Micro have revealed that cybercriminals, allegedly associated with at least six nation-states, are actively exploiting a zero-day vulnerability in Microsoft Windows. This vulnerability is being used for espionage, data theft, and cryptocurrency theft. The report also notes an increase in tactics where threat actors trick targets into installing malware through fake CAPTCHA checks. Furthermore, a new report from HP Wolf discusses the growing trend of using phony CAPTCHA checks to infect targets with malware, while Trend Micro's Zero Day Initiative has observed global exploitation of the Windows shell link shortcut format to execute malicious code.
Researchers with @TrendMicro's Zero Day Initiative said that threat actors around the globe have been taking advantage of the Windows shell link shortcut format to execute malicious code on target machines. #cybersecurity #infosec #ITsecurity https://t.co/rIfgpGyYpE
Nation-State 'Paragon' Spyware Infections Target Civil Society: https://t.co/Tr1SVGKVF0 by darkreading #infosec #cybersecurity #technology #news
Threat actors are increasingly looking to trick targets into infecting themselves with malware via phony CAPTCHA checks, according to a new report from @HP Wolf. #cybersecurity #infosec #ITsecurity https://t.co/irrwxQjEiP