Back to Feed

Tag

Identity & Access

IAM, MFA bypass, credential theft, authentication

50 items tagged #identity-access

Articles

‼️ A threat actor is advertising a Session ID hijacking service, claiming the ability to hijack a...

Threat actor advertises Session ID hijacking service for $5,000 USD in Monero.

Montana Empire is an #AI-assisted #phishing kit mimicking a national postal service’s e-commerce...

Montana Empire AI-assisted phishing kit targets postal service customers with card and ID theft.

Russian Forest Blizzard Hackers Hijack Home Routers for Global Spying

Russian Forest Blizzard group hijacks home routers for DNS-based espionage targeting 5,000+ devices globally.

US Disrupts Russian Espionage Operation Involving Hacked Routers and DNS Hijacking

US disrupts Russian APT28 espionage operation using hacked routers for DNS hijacking and AitM attacks.

Financial cyberthreats in 2025 and the outlook for 2026

Kaspersky 2025 financial threat report shows infostealers surge while banking malware declines, with phishing shifting

Feds quash widespread Russia-backed espionage network spanning 18,000 devices

FBI neutralizes Forest Blizzard espionage network compromising 18,000 routers across 120+ countries.

Snowflake customers hit in data theft attacks after SaaS integrator breach

Snowflake customers targeted in data theft after SaaS integrator Anodot breached and tokens stolen.

‼️🇺🇸 Threat actor McLovin is allegedly selling a database containing 4.6 million Robinhood Gold...

Threat actor McLovin offers 4.6M Robinhood Gold member records for sale.

‼️Threat actor OnarDev is allegedly selling a dataset containing personal information of 2 millio...

Threat actor OnarDev claims to sell dataset of 2M Coinbase users for $500.

Russia Hacked Routers to Steal Microsoft Office Tokens

Russia's GRU-linked Forest Blizzard hacks routers to mass-harvest Microsoft Office authentication tokens from 18,000

‼️ Threat actor JINKUSU advertises OMNITRIX IMAP service offering email account monitoring, attac...

Threat actor JINKUSU advertises OMNITRIX IMAP service for unauthorized email monitoring and manipulation.

Russian State-Linked APT28 Exploits SOHO Routers in Global DNS Hijacking Campaign

APT28 exploits MikroTik and TP-Link routers in global DNS hijacking campaign for credential theft.

Authorities disrupt router DNS hijacks used to steal Microsoft 365 logins

Law enforcement disrupts FrostArmada, APT28 campaign hijacking routers to steal Microsoft 365 credentials.

Signals from the Cloud Security Forecast 2026: Cloud Risk Is Scaling through Design, Not Disruption

Cloud Security Forecast 2026 identifies identity and permission patterns as predictable drivers of cloud compromise.

SOHO router compromise leads to DNS hijacking and adversary-in-the-middle attacks

Forest Blizzard compromises SOHO routers for DNS hijacking and AiTM attacks on Microsoft services.

APT28 exploit routers to enable DNS hijacking operations

APT28 exploits routers to hijack DNS and conduct credential-stealing man-in-the-middle attacks.

AEPD (Spain) - EXP202308705

Spain's AEPD fines Vodafone €200K for SIM-swap fraud enabling unauthorized bank access.

Wynn Resorts Says 21,000 Employees Affected by ShinyHunters Hack

Wynn Resorts confirms 21,000 employees affected by ShinyHunters data breach targeting HR systems.

DPRK-Linked Hackers Use GitHub as C2 in Multi-Stage Attacks Targeting South Korea

DPRK-linked Kimsuky group uses GitHub as C2 in multi-stage LNK-based attacks on South Korean targets.

Alleged Breach of KBank Vietnam Exposes 10.1 Million Credit Registration Records With National IDs, Salaries, Credit Scores, and Employer Details

KBank Vietnam breach exposes 10.1M credit records with national IDs, salaries, and credit scores.

‼️🇻🇳 Alleged Breach of KBank Vietnam Exposes 10.1 Million Credit Registration Records With Nati...

KBank Vietnam breach exposes 10.1M credit records with national IDs and salary data.

Automated Credential Harvesting Campaign Exploits React2Shell Flaw

UAT-10608 exploits React2Shell flaw in Next.js apps for automated credential theft.

North Korean Hackers Pose as Trading Firm to Steal $285M from Drift

North Korean hackers (UNC4736) stole $285M from Drift Protocol after six-month social engineering campaign.

‼️ Threat actor Jinkusu advertises sophisticated deepfake and voice manipulation software designe...

Threat actor Jinkusu advertises deepfake and voice manipulation tool for KYC bypass.

The Hack That Exposed Syria’s Sweeping Security Failures

Syrian government X accounts hijacked in March, revealing systemic cybersecurity failures and credential reuse.

Axios npm hack used fake Teams error fix to hijack maintainer account

North Korean UNC1069 compromised Axios npm maintainer via social engineering to publish malicious package versions.

‼️🇺🇸 Root-level firewall access to an unnamed major US financial services corporation with $2B+...

US financial firm with $2B+ revenue's root firewall access allegedly sold by initial access broker.

LinkedIn secretely scans for 6,000+ Chrome extensions, collects data

LinkedIn secretly scans 6,000+ Chrome extensions and collects device data via hidden JavaScript.

Hims & Hers warns of data breach after Zendesk support ticket breach

Hims & Hers suffers data breach via compromised Zendesk support tickets after ShinyHunters exploits Okta SSO accounts.

‼️ "Incogniton," a multi-accounting anti-detect browser, is being promoted on a popular cybercrim...

Incogniton anti-detect browser promoted on cybercrime forum with free tier.

‼️🇳🇱 RDWEB access to an unnamed Netherlands-based software company is allegedly being sold on a...

Threat actor AckLine sells RDWeb access to unnamed Netherlands software company on cybercrime forum.

North Korean Hackers Abuse GitHub to Spy on South Korean Firms

North Korean hackers abuse GitHub to spy on South Korean firms using LNK files and PowerShell.

‼️A collection of identity documents allegedly totaling nearly 1TB is being shared on a popular c...

MONEYLIN threat actor leaks ~1TB of identity documents from 45+ countries on cybercrime forum.

Man admits to locking thousands of Windows devices in extortion plot

Former infrastructure engineer pleads guilty to locking 254 servers in failed extortion plot.

Unit 42 identified a campaign targeting military entities with NATO, diplomatic, and military lur...

Unit 42 uncovers campaign targeting military entities using NATO exercise and defense conference lures.

‼️🇺🇸 A threat actor claims to be selling unauthorized administrator access to a U.S.-based X-Ca...

Threat actor claims to sell unauthorized admin access to U.S. X-Cart e-commerce store.

Iranian Cyber Threat Evolution: From MBR Wipers to Identity Weaponization

Iranian threat actors shift from custom wiper malware to identity abuse and MDM weaponization.

Iranian cyber ops shift: less custom malware, more destructive LotL. They target the enterprise m...

Iranian cyber ops shift to living-off-land techniques targeting enterprise management infrastructure.

Threat actor abuse of AI accelerates from tool to cyberattack surface

Threat actors embed AI across attack lifecycle, achieving 450% higher phishing click-through rates and industrialized

Ransomware isn't breaking into your network anymore… it's logging in. 🔑 Adversaries have moved...

SPIDER ransomware group shifts tactics from network infiltration to credential-based intrusions.

Microsoft Warns of WhatsApp Attachments Spreading Backdoor on Windows PCs

Microsoft warns of WhatsApp-delivered VBS malware installing backdoors on Windows PCs.

Adversaries Exploit Vacant Homes to Intercept Mail in Hybrid Cybercrime

Threat actors exploit vacant homes as mail drop addresses to intercept sensitive correspondence for fraud and identity

Storm Infostealer Sold as Service, Targets Browsers, Wallets and Accounts

Storm infostealer sold as subscription service bypasses Chrome encryption, targets browsers and crypto wallets.

The DFIR Report recently observed MEOWBACKCONN again in the wild: ➡️ Initial Access: Malicious...

DFIR Report documents MEOWBACKCONN malware campaign using fake Teams installer.

Critical Cisco IMC auth bypass gives attackers Admin access

Cisco patches critical IMC authentication bypass enabling unauthenticated Admin access.

Threat Brief: Recruiting Scheme Impersonating Palo Alto Networks Talent Acquisition Team

Unit 42 tracks phishing campaign impersonating Palo Alto Networks recruiters targeting senior professionals.

We identified a phishing campaign targeting senior professionals by impersonating Palo Alto Netwo...

Phishing campaign impersonates Palo Alto Networks using scraped LinkedIn data to target senior professionals.

LinkedIn Phishing Scam Uses Fake Notifications to Hijack Accounts

LinkedIn phishing campaign uses fake notifications and lookalike domains to steal credentials.

Vulta Intelligence Launches as Credential Lookup Service With 14.2 Billion Indexed Records, Telegram Bot, and Pay-Per-Query ULP Extraction

Vulta Intelligence launches credential lookup service indexing 14.2B stolen records via Telegram bot and web dashboard.

Vulta Intelligence Launches as Credential Lookup Service With 14.2 Billion Indexed Records, Teleg...

Vulta Intelligence launches credential lookup service indexing 14.2B records via Telegram bot.