Now Dyre could be going after Salesforce credentials, possibly to enable theft of databases or to further spread the malware through a known source, Tomer Weingarten, CEO of SentinelOne, told SCMagazine.com on Monday, adding that Dyre can be repurposed to go after any type of credentials.
Like this article? Follow us on LinkedIn, Twitter, YouTube or Facebook to see the content we post.
Read more about Cyber Security
- Turning the Tables on “Rombertik” Reveals the Story Behind the Threat
- DPRK Crypto Theft | macOS RustBucket Droppers Pivot to Deliver KandyKorn Payloads
- macOS MetaStealer | New Family of Obfuscated Go Infostealers Spread in Targeted Attacks
- Kryptina RaaS | From Underground Commodity to Open Source Threat
- January 2024 Cybercrime Update | Exploitation of Known CVEs, Crypto Drainers & Ransomware Updates
- MOVEit Transfer Vulnerability used to Drop File-Stealing SQL Shell