top of page
ALL POSTS
North Korea-Linked UNC1069 Uses AI Lures to Attack Cryptocurrency Organizations
Key Findings North Korea-linked threat actor UNC1069 has been observed targeting the cryptocurrency sector to steal sensitive data The intrusion relied on a social engineering scheme involving a compromised Telegram account, a fake Zoom meeting, a ClickFix infection vector, and reported usage of AI-generated video to deceive victims UNC1069 has a history of conducting social engineering campaigns for financial gain using fake meeting invites and posing as investors from reput
Feb 112 min read
Tudou Guarantee Marketplace Suspends Telegram Transactions
Key Findings Telegram-based illicit marketplace Tudou Guarantee has stopped transactions in its public groups after handling over $12 billion in transactions. Tudou Guarantee grew after the closure of the Huione Guarantee marketplace, with many sellers offering stolen data, money laundering services, and scam infrastructure. The shutdown of Tudou Guarantee is linked to the collapse of the Prince Group and the arrest of its chairman, Chen Zhi, in connection with a vast investm
Jan 202 min read
VVS Stealer: The Evolving Threat to Discord Credentials
Key Findings VVS Stealer is a Python-based malware that steals Discord credentials and tokens It has been sold on Telegram since at least April 2025 The malware uses the source code obfuscator Pyarmor to heavily obfuscate its Python code, hindering analysis and detection Background VVS Stealer is marketed on Telegram as the "ultimate stealer" and is sold via subscriptions or licenses, starting at €10 per week up to €199 for lifetime access The malware can steal Discord data,
Jan 51 min read
New Sturnus Banking Trojan Targets WhatsApp, Telegram, and Signal
Key Findings Sturnus is a new Android banking trojan with full device-takeover capabilities It targets secure messaging apps like WhatsApp, Telegram, and Signal to bypass encryption and steal sensitive data Sturnus employs sophisticated techniques like HTML overlays and accessibility-based keylogging to capture on-screen content, including messages, contacts, and credentials The malware enables remote control of infected devices through screen mirroring and a structured UI ma
Nov 21, 20252 min read
bottom of page

