Intelligence from encrypted platforms such as Sky ECC and ANOM has facilitated the arrest of 232 individuals and the seizure of millions in assets. This marks a significant achievement in a European law enforcement operation targeting drug trafficking. Coordinated International Effort A collaborative effort among international law enforcement agencies, known
Vault 33 | Cyber News & Intel
Vault 33 is your ultimate hub for cutting-edge cybersecurity insights, delivering expert analysis, detailed tutorials, research, and the latest updates in threat and vulnerability management.
Discover Our Featured Posts
Featured Posts

Intelligence from encrypted platforms such as Sky ECC and ANOM has facilitated the arrest of 232 individuals and the seizure of millions in assets. This marks a significant achievement in a European law enforcement operation targeting drug trafficking. Coordinated International Effort A collaborative effort among international law enforcement agencies, known
The cryptocurrency sector is reeling from a massive cyberattack, allegedly orchestrated by North Korea, which resulted in the theft of $1.5 billion from the Dubai-based exchange, Bybit. This incident marks the largest digital asset heist in history, highlighting significant vulnerabilities within the industry. The Heist Unfolds Bybit officials revealed

The cryptocurrency sector is reeling from a massive cyberattack, allegedly orchestrated by North Korea, which resulted in the theft of $1.5 billion from the Dubai-based exchange, Bybit. This incident marks the largest digital asset heist in history, highlighting significant vulnerabilities within the industry. The Heist Unfolds Bybit officials revealed
Recent cyberattacks have highlighted a vulnerability in Signal's device linking feature, allowing hackers to gain unauthorized access to user accounts. These attacks, primarily attributed to Russian-aligned threat actors, exploit the app's legitimate functionality to eavesdrop on communications. Exploitation of Signal's Device Linking The attacks

Recent cyberattacks have highlighted a vulnerability in Signal's device linking feature, allowing hackers to gain unauthorized access to user accounts. These attacks, primarily attributed to Russian-aligned threat actors, exploit the app's legitimate functionality to eavesdrop on communications. Exploitation of Signal's Device Linking The attacks
A novel malware named FinalDraft has been identified leveraging Outlook email drafts for command-and-control (C2) communications. This sophisticated attack has targeted a government ministry in a South American nation, as discovered by Elastic Security Labs. Malware Attack Overview The attack employs a comprehensive toolkit, including a custom malware loader called
A novel malware named FinalDraft has been identified leveraging Outlook email drafts for command-and-control (C2) communications. This sophisticated attack has targeted a government ministry in a South American nation, as discovered by Elastic Security Labs. Malware Attack Overview The attack employs a comprehensive toolkit, including a custom malware loader called
Recent alerts from the Cybersecurity Infrastructure & Security Agency (CISA) and the U.S. Food and Drug Administration (FDA) have raised concerns about potential vulnerabilities in the CONTEC CMS8000 patient monitors. These alerts suggest the presence of a backdoor communicating with a Chinese IP address. However, upon investigation, it appears

Recent alerts from the Cybersecurity Infrastructure & Security Agency (CISA) and the U.S. Food and Drug Administration (FDA) have raised concerns about potential vulnerabilities in the CONTEC CMS8000 patient monitors. These alerts suggest the presence of a backdoor communicating with a Chinese IP address. However, upon investigation, it appears
The emergence of GeoSpy, an AI-powered tool, underscores the growing need for caution in online photo sharing. This innovative software swiftly determines a location through image analysis, presenting notable privacy and security concerns. GeoSpy's Capabilities and Development GeoSpy, created by Graylark Technologies, employs artificial intelligence to identify locations
The emergence of GeoSpy, an AI-powered tool, underscores the growing need for caution in online photo sharing. This innovative software swiftly determines a location through image analysis, presenting notable privacy and security concerns. GeoSpy's Capabilities and Development GeoSpy, created by Graylark Technologies, employs artificial intelligence to identify locations
A significant breach of AT&T's network by the Chinese state-sponsored group, Salt Typhoon, has led to unauthorized access to sensitive U.S. telecommunications data. Active undetected for over 18 months until 2023, the breach exposed critical communications metadata of FBI informants, potentially creating a crisis for
A significant breach of AT&T's network by the Chinese state-sponsored group, Salt Typhoon, has led to unauthorized access to sensitive U.S. telecommunications data. Active undetected for over 18 months until 2023, the breach exposed critical communications metadata of FBI informants, potentially creating a crisis for
A Chinese cyber adversary known as UNC5337 has resumed its focus on uncovering vulnerabilities within Ivanti remote access devices, marking another chapter in a series of security challenges faced by the IT vendor. This latest threat leverages a critical remote code execution (RCE) vulnerability discovered in Ivanti’s products, reigniting
A Chinese cyber adversary known as UNC5337 has resumed its focus on uncovering vulnerabilities within Ivanti remote access devices, marking another chapter in a series of security challenges faced by the IT vendor. This latest threat leverages a critical remote code execution (RCE) vulnerability discovered in Ivanti’s products, reigniting
The United States has announced a reward of up to $5 million for information leading to the disruption of North Korean IT worker schemes. These operations involve illicit remote work practices that fuel the nation's prohibited missile programs. Involved Entities Two companies, Yanbian Silverstar based in China and
The United States has announced a reward of up to $5 million for information leading to the disruption of North Korean IT worker schemes. These operations involve illicit remote work practices that fuel the nation's prohibited missile programs. Involved Entities Two companies, Yanbian Silverstar based in China and
In a groundbreaking discovery, researchers have identified "the first UEFI bootkit specifically engineered to target Linux systems". This represents a significant evolution in bootkit threats, which have historically concentrated on Windows environments. Innovative Threat The UEFI bootkit is a sophisticated form of malware designed to integrate into the

In a groundbreaking discovery, researchers have identified "the first UEFI bootkit specifically engineered to target Linux systems". This represents a significant evolution in bootkit threats, which have historically concentrated on Windows environments. Innovative Threat The UEFI bootkit is a sophisticated form of malware designed to integrate into the
Russian APT28 Hackers Exploit US Company Wi-Fi from Afar In a remarkable demonstration of their capabilities, Russian cyber espionage group APT28, also known as Fancy Bear and linked to Russia's military intelligence agency GRU, successfully infiltrated a U.S. company's Wi-Fi network from a distant location.
Russian APT28 Hackers Exploit US Company Wi-Fi from Afar In a remarkable demonstration of their capabilities, Russian cyber espionage group APT28, also known as Fancy Bear and linked to Russia's military intelligence agency GRU, successfully infiltrated a U.S. company's Wi-Fi network from a distant location.
Read Our Latest Posts
Latest Posts
The U.S. Treasury Department announced a significant cybersecurity breach attributed to suspected Chinese threat actors, affecting the department’s systems and unclassified documents. The incident was caused by the exploitation of an API key from a third-party service provider, BeyondTrust. Incident Overview On December 8, 2024, BeyondTrust, a software

American Addiction Centers, a prominent rehabilitation organization in Brentwood, Tennessee, recently experienced a significant data breach affecting the personal information of 410,747 current and past patients. Details of the Breach In response to inquiries, the Maine Attorney General received notification letters confirming the breach compromised sensitive data—including names,

The Attack and Its Perpetrators Salt Typhoon, also identified as Earth Estries, FamousSparrow, Ghost Emperor, and UNC2286, has been actively compromising government and telecom networks in Southeast Asia since at least 2019. The group’s latest known victim, an American telecom company, emerged after the Biden administration published new guidelines

The Apache Software Foundation (ASF) has released updates to address a severe SQL injection vulnerability in Apache Traffic Control, identified as CVE-2024-45387. Facing a critical Common Vulnerability Scoring System (CVSS) score of 9.9, this flaw impacts the robust Traffic Control solution, which allows operators to establish scalable and distributed

A Brazilian national has been indicted in the United States for cyber extortion after allegedly breaching a substantial number of user accounts and demanding a hefty ransom in Bitcoin. Defendant Junior Barros De Oliveira, aged 29, hailing from Curitiba, Brazil. Indictment Filed by the U.S. Department of Justice (DoJ)

On December 23, 2024, Pittsburgh Regional Transit (PRT) disclosed it was contending with a ransomware attack, discovered initially on December 19. This breach notably disrupted transit services across the Pittsburgh metropolitan area, which PRT serves by operating a diverse array of transportation options, including buses, light rail, and incline services.

A Romanian man, Daniel Christian Hulea, has been sentenced to 20 years in prison following his pivotal involvement in the notorious NetWalker ransomware attacks. Hulea, 30, entered a guilty plea to charges of computer and wire fraud conspiracy on June 20 after admitting to extorting around $21.5 million in

Cybersecurity experts have raised alarms about threat actors exploiting a newly uncovered vulnerability in Apache Struts—labeled CVE-2024-53677. This flaw carries a critical CVSS score of 9.5, underscoring its severity. Exploiting this vulnerability could allow attackers to upload harmful files, leading to potential remote code execution. According to an

Mark Sokolovsky, a Ukrainian citizen, has received a five-year prison sentence for his pivotal role in the notorious Raccoon Stealer malware operation. Court documents reveal that Sokolovsky, known by aliases such as raccoon-stealer, Photix, and black21jack77777, collaborated with co-conspirators to distribute the malware through a MaaS (malware-as-a-service) model, charging $75