CODEREDVTA

Vulnerability and Threat Advisories

“Security rules and techniques that helping you stay ahead of cyber threats”

New Malware
08/03/2023

New Malware “ImBetter” Targets Cryptocurrency Users

VTA-00438 – New Malware “ImBetter” Targets Cryptocurrency Users Researchers at CRIL have recently discovered fraudulent websites that mimic popular crypto-wallets and file converters, with a specific focus on Windows users. These deceptive sites deceive users into downloading the newly discovered …

Read More
PureCrypter Malware Targets Government Entities in Asia-Pacific and North America
01/03/2023

PureCrypter Malware Targets Government Entities in Asia-Pacific and North America

VTA-00437 – PureCrypter Malware Targets Government Entities in Asia-Pacific and North America PureCrypter is a highly sophisticated malware that has been found targeting government entities in the Asia-Pacific region and North America. The malware is delivered through phishing emails or …

Read More
Stealc, A New InfoStealer Based on Vidar and Raccoon
21/02/2023

Stealc, A New InfoStealer Based on Vidar and Raccoon

VTA-00436 – Stealc, A New InfoStealer Based on Vidar and Raccoon Researchers have discovered a new information stealer advertised as Stealc which is being promoted by its alleged developer, Plymouth in the dark web. Stealc is presented as a fully …

Read More
'V3G4' The New Variant of Mirai Botnet Targeting Linux Devices
20/02/2023

‘V3G4’ The New Variant of Mirai Botnet Targeting Linux Devices

VTA-00435 – ‘V3G4’ The New Variant of Mirai Botnet Targeting Linux Devices A new variant of the Mirai botnet has been discovered that utilizes several security vulnerabilities to infect Linux and IoT devices. Palo Alto Networks Unit 42 identified the …

Read More
Image Credit By Pixabay
17/02/2023

New APT Group Found Targeting Government Organizations in APAC

VTA-00434 – New APT Group Found Targeting Government Organizations in APAC These threat actors are leveraging a new set of tactics, techniques, and procedures rarely utilized by previously known APT groups. They leverage a custom toolkit, featuring TelePowerBot, KamiKakaBot, and Cucky and Ctealer information …

Read More

Case Study