Intelligence from encrypted platforms such as Sky ECC and ANOM has facilitated the arrest of 232 individuals and the seizure of millions in assets. This marks a significant achievement in a European law enforcement operation targeting drug trafficking. Coordinated International Effort A collaborative effort among international law enforcement agencies, known
Vault 33 | Cyber News & Intel
Vault 33 is your ultimate hub for cutting-edge cybersecurity insights, delivering expert analysis, detailed tutorials, research, and the latest updates in threat and vulnerability management.
Discover Our Featured Posts
Featured Posts

Intelligence from encrypted platforms such as Sky ECC and ANOM has facilitated the arrest of 232 individuals and the seizure of millions in assets. This marks a significant achievement in a European law enforcement operation targeting drug trafficking. Coordinated International Effort A collaborative effort among international law enforcement agencies, known
The cryptocurrency sector is reeling from a massive cyberattack, allegedly orchestrated by North Korea, which resulted in the theft of $1.5 billion from the Dubai-based exchange, Bybit. This incident marks the largest digital asset heist in history, highlighting significant vulnerabilities within the industry. The Heist Unfolds Bybit officials revealed

The cryptocurrency sector is reeling from a massive cyberattack, allegedly orchestrated by North Korea, which resulted in the theft of $1.5 billion from the Dubai-based exchange, Bybit. This incident marks the largest digital asset heist in history, highlighting significant vulnerabilities within the industry. The Heist Unfolds Bybit officials revealed
Recent cyberattacks have highlighted a vulnerability in Signal's device linking feature, allowing hackers to gain unauthorized access to user accounts. These attacks, primarily attributed to Russian-aligned threat actors, exploit the app's legitimate functionality to eavesdrop on communications. Exploitation of Signal's Device Linking The attacks

Recent cyberattacks have highlighted a vulnerability in Signal's device linking feature, allowing hackers to gain unauthorized access to user accounts. These attacks, primarily attributed to Russian-aligned threat actors, exploit the app's legitimate functionality to eavesdrop on communications. Exploitation of Signal's Device Linking The attacks
A novel malware named FinalDraft has been identified leveraging Outlook email drafts for command-and-control (C2) communications. This sophisticated attack has targeted a government ministry in a South American nation, as discovered by Elastic Security Labs. Malware Attack Overview The attack employs a comprehensive toolkit, including a custom malware loader called
A novel malware named FinalDraft has been identified leveraging Outlook email drafts for command-and-control (C2) communications. This sophisticated attack has targeted a government ministry in a South American nation, as discovered by Elastic Security Labs. Malware Attack Overview The attack employs a comprehensive toolkit, including a custom malware loader called
Recent alerts from the Cybersecurity Infrastructure & Security Agency (CISA) and the U.S. Food and Drug Administration (FDA) have raised concerns about potential vulnerabilities in the CONTEC CMS8000 patient monitors. These alerts suggest the presence of a backdoor communicating with a Chinese IP address. However, upon investigation, it appears

Recent alerts from the Cybersecurity Infrastructure & Security Agency (CISA) and the U.S. Food and Drug Administration (FDA) have raised concerns about potential vulnerabilities in the CONTEC CMS8000 patient monitors. These alerts suggest the presence of a backdoor communicating with a Chinese IP address. However, upon investigation, it appears
The emergence of GeoSpy, an AI-powered tool, underscores the growing need for caution in online photo sharing. This innovative software swiftly determines a location through image analysis, presenting notable privacy and security concerns. GeoSpy's Capabilities and Development GeoSpy, created by Graylark Technologies, employs artificial intelligence to identify locations
The emergence of GeoSpy, an AI-powered tool, underscores the growing need for caution in online photo sharing. This innovative software swiftly determines a location through image analysis, presenting notable privacy and security concerns. GeoSpy's Capabilities and Development GeoSpy, created by Graylark Technologies, employs artificial intelligence to identify locations
A significant breach of AT&T's network by the Chinese state-sponsored group, Salt Typhoon, has led to unauthorized access to sensitive U.S. telecommunications data. Active undetected for over 18 months until 2023, the breach exposed critical communications metadata of FBI informants, potentially creating a crisis for
A significant breach of AT&T's network by the Chinese state-sponsored group, Salt Typhoon, has led to unauthorized access to sensitive U.S. telecommunications data. Active undetected for over 18 months until 2023, the breach exposed critical communications metadata of FBI informants, potentially creating a crisis for
A Chinese cyber adversary known as UNC5337 has resumed its focus on uncovering vulnerabilities within Ivanti remote access devices, marking another chapter in a series of security challenges faced by the IT vendor. This latest threat leverages a critical remote code execution (RCE) vulnerability discovered in Ivanti’s products, reigniting
A Chinese cyber adversary known as UNC5337 has resumed its focus on uncovering vulnerabilities within Ivanti remote access devices, marking another chapter in a series of security challenges faced by the IT vendor. This latest threat leverages a critical remote code execution (RCE) vulnerability discovered in Ivanti’s products, reigniting
The United States has announced a reward of up to $5 million for information leading to the disruption of North Korean IT worker schemes. These operations involve illicit remote work practices that fuel the nation's prohibited missile programs. Involved Entities Two companies, Yanbian Silverstar based in China and
The United States has announced a reward of up to $5 million for information leading to the disruption of North Korean IT worker schemes. These operations involve illicit remote work practices that fuel the nation's prohibited missile programs. Involved Entities Two companies, Yanbian Silverstar based in China and
In a groundbreaking discovery, researchers have identified "the first UEFI bootkit specifically engineered to target Linux systems". This represents a significant evolution in bootkit threats, which have historically concentrated on Windows environments. Innovative Threat The UEFI bootkit is a sophisticated form of malware designed to integrate into the

In a groundbreaking discovery, researchers have identified "the first UEFI bootkit specifically engineered to target Linux systems". This represents a significant evolution in bootkit threats, which have historically concentrated on Windows environments. Innovative Threat The UEFI bootkit is a sophisticated form of malware designed to integrate into the
Russian APT28 Hackers Exploit US Company Wi-Fi from Afar In a remarkable demonstration of their capabilities, Russian cyber espionage group APT28, also known as Fancy Bear and linked to Russia's military intelligence agency GRU, successfully infiltrated a U.S. company's Wi-Fi network from a distant location.
Russian APT28 Hackers Exploit US Company Wi-Fi from Afar In a remarkable demonstration of their capabilities, Russian cyber espionage group APT28, also known as Fancy Bear and linked to Russia's military intelligence agency GRU, successfully infiltrated a U.S. company's Wi-Fi network from a distant location.
Read Our Latest Posts
Latest Posts

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has recently expanded its Known Exploited Vulnerabilities (KEV) catalog by adding several critical vulnerabilities that are currently being exploited. These affect Zyxel, North Grid Proself, ProjectSend, and CyberPanel products. Identified Vulnerabilities CVE-2024-51378: Rated with a CVSS score of 10.0, this

A cyber espionage campaign, potentially linked to a Chinese hacking group, infiltrated a prominent U.S. company earlier this year, compromising its systems for four months, according to a report by Symantec, a subsidiary of Broadcom. The attack, noticed initially on April 11, 2024, persisted until August, although experts speculate

A covert cyber threat group identified as Earth Minotaur is utilizing the MOONSHINE exploit toolkit in conjunction with a newly discovered backdoor dubbed DarkNimbus to conduct targeted surveillance activities against Tibetan and Uyghur communities. MOONSHINE Exploit Kit Initially detected in September 2019 targeting the Tibetan community, MOONSHINE uses vulnerabilities in
A new threat has emerged: the DroidBot Android remote access trojan (RAT). Targeting 77 banks, cryptocurrency exchanges, and major organizations, this malware exemplifies the evolving strategies cybercriminals are employing today. Advanced Capabilities and Techniques DroidBot stands out for its advanced features, as highlighted by Cleafy's cybersecurity experts Simone

Recently, the SmokeLoader malware has re-emerged, targeting key industries in Taiwan, including manufacturing, healthcare, and information technology. This latest threat highlights the malware's capacity to conduct complex attacks through its modular design. Fortinet FortiGuard Labs reports that SmokeLoader is exploiting its flexibility to execute attacks autonomously by downloading
A cybersecurity group aligned with North Korea, known as Kimsuky, has been identified in a series of sophisticated phishing attacks designed to steal user credentials. The method involves deploying emails that seemingly originate from Russian senders. Shift in Tactics Initially utilizing Japanese and Korean email services, Kimsuky shifted in mid-September

A Moscow court has handed a life sentence to Stanislav Moiseyev, identified as the orchestrator of Hydra Market, a globally notorious dark web marketplace. The court also imposed a fine of four million roubles on him, while fifteen of his associates received prison terms ranging from 8 to 23 years,

Cisco has issued a new advisory concerning the active exploitation of a ten-year-old security flaw in its Adaptive Security Appliance (ASA) software. The vulnerability, identified as CVE-2014-2120, poses a potential risk for cross-site scripting (XSS) attacks through ASA's WebVPN. Vulnerability Overview CVE-2014-2120, with a CVSS score of 4.
In a major step forward in the fight against cybercrime, INTERPOL's global initiative, Operation HAECHI V, has led to the arrest of over 5,500 cybercriminals and the recovery of more than $400 million in stolen funds. This operation, which spanned five months from July to November 2024,