WailingCrab malware, which originates from threat actor TA544, is using delivery-themed emails to infect hosts, subsequent to which it deploys a backdoor, allowing the C2 server to send more payloads. The malware utilises a lightweight messaging protocol, MQTT, and has switched from using Discord to MQTT for stealth and detection evasion. Components of the malware are stored on platforms like Discord.
.webp?w=0&resize=0,0&ssl=1)
Hackers Use Fake BTS World Tour Ticket Sites to Scam Fans Across Multiple Countries
Cybercriminals are capitalizing on the excitement around BTS’s long-awaited return to the world stage by setting up fraudulent ticket websites that steal money from unsuspecting


