A stress testing service for simulating DDoS attacks on websites and servers. Threat actors can misuse such DDoS-for-hire services to target domains using unauthorized attacks.
With a malicious intent to attack financial institutions, attackers deliver Crimson RAT via email attachments and links shared through phishing emails.
The hacker group displays a message, on the website, directed to its members. The message claims that the group's administrator, S1ege, hacked the site
CloudSEK’s Threat Intelligence Team discovered an URL, wherein an open redirection vulnerability was exploited to direct the victim to a login page of an entity belonging to the government of Qatar.