Monday, August 25, 2025
NewsWave
No Result
View All Result
  • Home
  • World
  • USA
  • Business
  • Sports
  • Entertainment
  • Technology
Login
  • Home
  • World
  • USA
  • Business
  • Sports
  • Entertainment
  • Technology
Login
No Result
View All Result
Login
NewsWave
No Result
View All Result
Home Technology

This cybercrime group uses the most basic tactics around — but they seem to be working just fine

5 April 2024
in Technology
0
This cybercrime group uses the most basic tactics around — but they seem to be working just fine
Share on FacebookShare on Twitter



Successful hacking techniques don’t always have to be highly advanced. Lazy Koala is a prime example of this.

A new threat actor named Lazy Koala has been discovered by cybersecurity researchers from Positive Technologies Expert Security Center (PT ESC). Despite lacking in sophistication, this group has been able to achieve remarkable results.

Lazy Koala is targeting enterprises in Russia and six Commonwealth of Independent States countries – Belarus, Kazakhstan, Uzbekistan, Kyrgyzstan, Tajikistan, and Armenia. Their victims primarily come from government agencies, financial organizations, and educational institutions, with a focus on obtaining login credentials for various services.

Exfiltration via Telegram

According to the researchers, nearly 900 accounts have been compromised so far. The attackers’ motives remain unclear, but it is suspected that they are either selling the information on the dark web or using it for more destructive attacks.

The attacks are relatively simple, involving convincing phishing attempts in local languages to trick victims into downloading and running attachments. The files distributed in these phishing attacks contain a basic password stealer malware.

The stolen files are then exfiltrated via Telegram bots. The individual managing these bots is referred to as Koala, which inspired the name of the group.

“The defining characteristic of this new group is: ‘harder doesn’t mean better.’ Lazy Koala doesn’t rely on complex tools or tactics, yet they are still able to accomplish their goals,” said Denis Kuvshinov, Head of Threat Analysis at Positive Technologies Expert Security Center.

Sign up to the TechRadar Pro newsletter for the latest news, opinion, features, and advice to help your business succeed!

“Once installed on a compromised device, the malware uses Telegram, a popular tool among attackers, to send the stolen data,” Kuvshinov explained.

PT ESC has informed the victims of the campaign and suspects that the stolen information will likely be sold on the dark web.

More from TechRadar Pro



Source link

🪄 Creating a simple explanation...

Tags: basiccybercrimefineGroupTacticsWorking
Previous Post

For families of hostages, it’s a race against time as Israel’s war reaches six-month mark

Next Post

Nadia was discouraged from a career in her homeland. In Australia, she’s catering for Eid al-Fitr

Related Posts

Road to Battlefield: Central Eurasia’s largest startup competition in history sends four winners to TechCrunch Startup Battlefield
Technology

Road to Battlefield: Central Eurasia’s largest startup competition in history sends four winners to TechCrunch Startup Battlefield

by My News Wave
25 August 2025
0

The startup ecosystem in Central Eurasia is gaining momentum, marked by a significant pitch competition that attracted 485 applications from 27 countries, including Armenia, Azerbaijan, and India. This event showcases the region's burgeoning entrepreneurial spirit and diverse talent, positioning it as a notable player in the global startup landscape. Want More Context? 🔎

Read more
Google's new smart home hardware looks mostly familiar in leaked images
Technology

Google's new smart home hardware looks mostly familiar in leaked images

by My News Wave
25 August 2025
0

Google is set to enhance its smart home offerings with the upcoming release of the Google Home Speaker and new Nest products, featuring improved designs and functionalities, including 360-degree sound and 2K resolution cameras. The new lineup will also introduce subscription plans under the rebranded Google Home Premium, with more details expected as the Gemini for Home launches in October. Want More Context? 🔎

Read more
Elon Musk’s xAI is suing OpenAI and Apple
Technology

Elon Musk’s xAI is suing OpenAI and Apple

by My News Wave
25 August 2025
0

Elon Musk is suing Apple and OpenAI, alleging that their partnership to integrate ChatGPT into iPhones stifles competition in the AI sector. Musk's companies claim that Apple prioritizes ChatGPT in the App Store, thereby preventing rivals like Grok and X from competing effectively, which they argue constitutes an antitrust violation. Want More Context? 🔎

Read more
⚡ Weekly Recap: Password Manager Flaws, Apple 0-Day, Hidden AI Prompts, In-the-Wild Exploits & More
Technology

⚡ Weekly Recap: Password Manager Flaws, Apple 0-Day, Hidden AI Prompts, In-the-Wild Exploits & More

by My News Wave
25 August 2025
0

Cybersecurity today is influenced by global politics, where a single breach can disrupt supply chains and alter power dynamics. Leaders must adopt a strategic approach to defense, recognizing that the strongest organizations effectively link cyber risks to their business strategies rather than relying solely on tools and technologies. Want More Context? 🔎

Read more
Transparent Tribe Targets Indian Govt With Weaponized Desktop Shortcuts via Phishing
Technology

Transparent Tribe Targets Indian Govt With Weaponized Desktop Shortcuts via Phishing

by My News Wave
25 August 2025
0

The advanced persistent threat (APT) group Transparent Tribe has been targeting Indian Government entities by exploiting both Windows and BOSS (Bharat Operating System Solutions) Linux systems using malicious Desktop shortcut files. According to CYFIRMA, initial access is gained through spear-phishing emails, specifically targeting Linux BOSS environments with weaponized .desktop files. Want More Context? 🔎

Read more
I reviewed the Honor Magic V Flip 2 Jimmy Choo flip phone. It’s flipping fantastic but needs a global release
Technology

I reviewed the Honor Magic V Flip 2 Jimmy Choo flip phone. It’s flipping fantastic but needs a global release

by My News Wave
25 August 2025
0

Meet the Honor Magic V Flip 2, a stylish flip phone inspired by Jimmy Choo, boasting a remarkable 200MP camera, the largest battery, and the fastest charging capabilities in its category. Despite its impressive features, its availability remains a significant concern for potential buyers. Want More Context? 🔎

Read more
NewsWave

News Summarized. Time Saved. Bite-sized news briefs for busy people. No fluff, just facts.

CATEGORIES

  • Africa
  • Asia Pacific
  • Australia
  • Business
  • Canada
  • Entertainment
  • Europe
  • India
  • Middle East
  • New Zealand
  • Sports
  • Technology
  • UK
  • USA
  • World

LATEST NEWS STORIES

  • Canadian grave of general who torched White House in 1814 draws interest amid trade war
  • Former NFL QB Ben DiNucci announces he will serve as CBS Sports commentator for Bucknell vs. Air Force
  • Israel bombs hospital, kills journalists, medics, dozens more across Gaza | Israel-Palestine conflict News
  • About Us
  • Disclaimer
  • Privacy Policy
  • Cookie Privacy Policy
  • Terms and Conditions
  • Contact Us

Copyright © 2025 News Wave
News Wave is not responsible for the content of external sites.

No Result
View All Result
  • Home
  • World
  • USA
  • Business
  • Sports
  • Entertainment
  • Technology

Copyright © 2025 News Wave
News Wave is not responsible for the content of external sites.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In