Skip to content
Wednesday, May 13, 2026
  • JDownloader Site Compromise Shows Why Trusted Downloads Still Need Verification
  • Fake OpenAI Hugging Face Repo Shows AI Supply Chain Risk Is Already Here
  • MCP Server Command Injection Shows Why AI Tools Need Real Isolation
  • Dirty Frag Turns Linux Footholds Into Root: What Defenders Should Do Now
Register / Sign Up
RSS
Bulwark Black LLC

Bulwark Black LLC

Cyber Security | Software Development | Consulting Services

  • Cyber Threat Intelligence
    • Russian Cyber Threat Intelligence
      • Russian Actors and Alias’s 09JAN2024
    • Chinese Cyber Threat Intelligence
      • Chinese Actors and Alias’s
    • North Korean Cyber Threat Intelligence
      • North Korean Actors and Alias’s
    • Iranian Cyber Threat Intelligence
      • Iranian Actors and Alias’s
    • Malware
      • Top 200 Malware of January 2024
    • Global Cyber Threat Intelligence
      • Global Threat Actors
  • Defensive Security
    • Detection
  • Offensive Security
    • Bug Bounty
    • Offensive Devices / Tactics
    • Red Teaming
  • AI (Artificial Intelligence)
    • AI (General)
  • Privacy & Security
    • Becoming Self Sufficient
    • Digital Assets
    • Makes you Think
    • Social Engineering
  • Research Papers
  • Training / Projects
    • Projects
    • Training
  • Blog
    • Cyber Security Blog
  • Contact
  • About
  • Donations
  • Products
    • VA Disability Calc & Track App
  • Services
  • Operational Technology (OT)
  • JDownloader Site Compromise Shows Why Trusted Downloads Still Need Verification
  • Fake OpenAI Hugging Face Repo Shows AI Supply Chain Risk Is Already Here
  • MCP Server Command Injection Shows Why AI Tools Need Real Isolation
  • Dirty Frag Turns Linux Footholds Into Root: What Defenders Should Do Now
Register / Sign Up
RSS
Bulwark Black LLC

Bulwark Black LLC

Cyber Security | Software Development | Consulting Services

  • Cyber Threat Intelligence
    • Russian Cyber Threat Intelligence
      • Russian Actors and Alias’s 09JAN2024
    • Chinese Cyber Threat Intelligence
      • Chinese Actors and Alias’s
    • North Korean Cyber Threat Intelligence
      • North Korean Actors and Alias’s
    • Iranian Cyber Threat Intelligence
      • Iranian Actors and Alias’s
    • Malware
      • Top 200 Malware of January 2024
    • Global Cyber Threat Intelligence
      • Global Threat Actors
  • Defensive Security
    • Detection
  • Offensive Security
    • Bug Bounty
    • Offensive Devices / Tactics
    • Red Teaming
  • AI (Artificial Intelligence)
    • AI (General)
  • Privacy & Security
    • Becoming Self Sufficient
    • Digital Assets
    • Makes you Think
    • Social Engineering
  • Research Papers
  • Training / Projects
    • Projects
    • Training
  • Blog
    • Cyber Security Blog
  • Contact
  • About
  • Donations
  • Products
    • VA Disability Calc & Track App
  • Services
  • Operational Technology (OT)
  • Home
  • Malware
  • Alert: Carbanak Malware Strikes Again With Updated Tactics
  • Malware

Alert: Carbanak Malware Strikes Again With Updated Tactics

bulwarkblack2 years ago2 years ago01 mins
Alert: Carbanak Malware Strikes Again With Updated Tactics
Tagged: Carbanak Spear Phishing

Post navigation

Previous: From Akamai to F5 to NTLM… with love.
Next: NoName on Rampage! Claims DDoS Attacks on Ukrainian Government Sites

Related News

Cybersecurity illustration of a trusted software download site being abused to deliver poisoned installers in a supply chain attack. Featured image for Bulwark Black analysis of the JDownloader website installer compromise.

JDownloader Site Compromise Shows Why Trusted Downloads Still Need Verification

acint4 days ago 0
Editorial cybersecurity illustration of a fake AI model repository hiding an infostealer attack chain. Featured image: AI software supply chain risk and infostealer delivery through a fake model repository.

Fake OpenAI Hugging Face Repo Shows AI Supply Chain Risk Is Already Here

acint4 days ago 0
Dark editorial illustration of a cloud worm stealing credentials from containerized cloud infrastructure AI-generated editorial image created in Discord/Midjourney for Bulwark Black.

PCPJack Shows Cloud Malware Is Moving From Cryptomining to Credential Theft

acint6 days ago 0

CrystalX RAT: New Malware-as-a-Service Combines Spyware, Stealer, and Prankware Capabilities

acint1 month ago 0

File Search

2
ThumbNameSizeDate
Thumb IOCs_YARA_TTPs_Posted_Articles/ IOCs_YARA_TTPs_Posted_Articles

IOCs_YARA_TTPs_Posted_Articles

Open 99.71 KB 2024-01-12 January 12, 2024 2024-03-22 March 22, 2024
21 Items
99.71 KB
March 22, 2024

0

57f079932b

2026 Powered By BlazeThemes.