AlienVault OTX Threat Intelligence

API Connected Successfully

Displaying page 10 of available threat intelligence pulses.

Total pulses: 7,648

Brand impersonation, online ads, and malicious merchants help purchase scam network prey on victims TLP:white
AlienVault
A network of 71 purchase scam websites has been identified, linked to 12 shared merchant accounts used for fraudulent transactions. The scams employ brand impersonation, online ads, and malicious merchants to target victims. The network, operational since February 2025, uses typosquatting and brand logo abuse to impersonate legitimate retailers. Transactions with the identified merchant accounts are likely fraudulent and facilitate card compromise. The network's attribution remains unclear, possibly controlled by a single actor or multiple actors collaborating through dark web services. Mitigation strategies for card issuers and merchant acquirers are provided to reduce financial fraud and compliance risks associated with these scams.
dark web services online ads typosquatting transaction laundering purchase scam +1 more
domain 68 hostname 3
Created: May 20, 2025 9:16 PM Updated: May 20, 2025 9:27 PM
New Nitrogen Ransomware Targets Financial Firms in the US, UK and Canada TLP:white
AlienVault
Nitrogen, a new ransomware strain identified in September 2024, has become a significant threat to organizations worldwide, particularly in the financial sector. It encrypts critical data and demands substantial payments for decryption, targeting industries such as finance, construction, manufacturing, and technology in the United States, Canada, and the United Kingdom. The ransomware's attack chain begins with malvertising campaigns on search engines, tricking users into downloading trojanized installers. It uses tools like Cobalt Strike and Meterpreter shells to establish persistence and move laterally within networks. Notable victims include SRP Federal Credit Union, Red Barrels, Control Panels USA, and Kilgore Industries. Nitrogen employs sophisticated tactics, including system reconnaissance, advanced evasion techniques, and exploitation of vulnerable drivers to disable security tools.
data exfiltration malvertising ransomware cobalt strike nitrogen +2 more
FileHash-MD5 1 FileHash-SHA1 1 FileHash-SHA256 2
Created: May 20, 2025 7:27 PM Updated: May 20, 2025 7:29 PM
Sarcoma Ransomware Unveiled: Anatomy of a Double Extortion Gang TLP:white
AlienVault
Sarcoma Ransomware, first detected in October 2024, has rapidly become a major cybersecurity threat, targeting high-value companies across industries. It uses advanced tactics like zero-day exploits and RMM tools for network discovery and credential theft. The group has impacted organizations in various countries, with the USA, Italy, and Canada being the most affected. Sarcoma employs sophisticated encryption techniques, combining RSA and ChaCha20, and has versions for both Windows and Linux systems. The malware includes network propagation capabilities and anti-recovery measures for hypervisor systems. Notably, it avoids infecting systems with Uzbek keyboard layouts, suggesting possible origins or affiliations. The group's activities highlight the need for improved cybersecurity measures in organizations worldwide.
linux hypervisor sarcoma ransomware rsa encryption +3 more
FileHash-MD5 2 FileHash-SHA1 2 FileHash-SHA256 2
Created: May 20, 2025 7:18 PM Updated: May 20, 2025 7:21 PM
SAP Zero – Frostbite: How Russian RaaS Actor Qilin Exploited CVE-2025-31324 Weeks Before its Public Disclosure TLP:white
AlienVault
CVE-2025-31324 hit the security world like a tsunami – an easily exploitable SAP vulnerability affecting enterprise environments across the globe. But while most assumed its exploitation began post-disclosure, new evidence suggests otherwise. During an incident response led by OP Innovate for a major global enterprise, we uncovered proof that this vulnerability was actively exploited nearly three weeks before it was made public. While recent articles point the finger towards China-Linked APTs, we identified communication with known Cobalt Strike C2 infrastructure and IP addresses linked directly to Qilin, a notorious Russian-speaking Ransomware-as-a-Service group.
SAP NetWeaver Cobalt Strike Qilin Ransomware Ransomware-as-a-Service (RaaS)
FileHash-MD5 2 FileHash-SHA1 1 FileHash-SHA256 1 IPv4 3 domain 1
Created: May 20, 2025 6:01 PM Updated: May 20, 2025 6:02 PM
AZORult - C2 IP/Domain Tracker TLP:white
AlienVault
Command and Control URLs for AZORult. The URLs are taken from azorult-tracker.net/ and filtered for false positives.
URL 179
Created: Jan 22, 2020 11:33 AM Updated: May 20, 2025 12:05 PM
AI Chat
AI Assistant
×
Hello! I'm the MM Computers AI assistant. How can I help you today?