A previously unknown China-linked advanced persistent threat (APT) group, named PlushDaemon, has been identified as responsible for a supply chain attack targeting a South Korean VPN provider in 2023. The attack involved various methods, including screen recording and browser password harvesting. In addition, two ransomware groups have been reported to be exploiting Microsoft Teams and Office 365 services to gain unauthorized access to organizations, deploying ransomware in the process. The threat landscape also includes a financially motivated hacker group called TRIPLESTRENGTH, which is targeting cloud environments for cryptojacking and ransomware attacks, affecting platforms such as Google Cloud, AWS, and Microsoft Azure. Furthermore, users who downloaded an installer from the South Korean VPN provider IPany may be at risk due to the malware associated with the attack.
TRIPLESTRENGTH Hits Cloud for Cryptojacking, On-Premises Systems for Ransomware https://t.co/KmFcHx2j2q
🔒 Google uncovers "TRIPLESTRENGTH," a financially motivated hacker group targeting cloud environments for cryptojacking and ransomware. Their extensive reach includes Google Cloud, AWS, and Microsoft Azure. 👉 Read the full report: https://t.co/zf5saweVAP
A suspected RansomHub affiliate used a novel Python backdoor to establish persistence on a victim’s network in an incident documented by @GuidePointSec. #ransomware #cybersecurity #infosec #ITsecurity https://t.co/hlcxA6msUl