----------------------------------------------------------------------------------
@MSGID: 2:467/888.188 662534b9
A threat actor called Water Curupira has been observed actively
distributing the PikaBot loader malware as part of spam campaigns in
2023. ?PikaBot?s operators ran phishing campaigns, targeting victims
via its two components ? a loader and a core module ? which enabled
unauthorized remote access and allowed the execution of arbitrary
commands through an established connection
https://thehackernews.com/2024/01/alert-water-curupira-hackers-actively.html
2024-01-09 21:31:00+05:30
________________________________
--- UA.HACKER - твiй помiчник у сферi кiбербезпеки | читай ще +SECURITY +UA.IT
* Origin: Читай нас за допомогою
http://winpoint.org (2:467/888.188)
SEEN-BY: 463/68 877 1331 467/4 888 5001/100
5005/49 5015/255 5019/40 5020/848
SEEN-BY: 5020/1042 4441 12000 5030/49 1081 5058/104
5060/900 5061/133
SEEN-BY: 5075/128
@PATH: 467/888 5020/1042 4441