Feb. 27, 2023, 1:32 p.m. | Madalina Popovici

Heimdal Security Blog heimdalsecurity.com

A threat actor has been spotted delivering several information stealers and ransomware strains to government organizations via the PureCrypter malware downloader. According to researchers from Menlo Security, the threat actor used Discord to host the initial payload and exploited a non-profit organization to store additional hosts used in the campaign. Menlo Labs has uncovered an […]


The post PureCrypter Malware Is Targeting Government Entities appeared first on Heimdal Security Blog.

actor blog campaign cybersecurity news discord entities exploited government heimdal security host information information stealers labs malware menlo labs menlo security non non-profit organization organizations payload profit purecrypter ransomware researchers security security blog stealers store targeting threat threat actor

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Cybersecurity Engineer

@ Booz Allen Hamilton | USA, VA, Arlington (1550 Crystal Dr Suite 300) non-client

Invoice Compliance Reviewer

@ AC Disaster Consulting | Fort Myers, Florida, United States - Remote

Technical Program Manager II - Compliance

@ Microsoft | Redmond, Washington, United States

Head of U.S. Threat Intelligence / Senior Manager for Threat Intelligence

@ Moonshot | Washington, District of Columbia, United States

Customer Engineer, Security, Public Sector

@ Google | Virginia, USA; Illinois, USA