Velociraptor in the Wild: How Legitimate Tools Are Becoming Cyber Villains!

Cybersecurity researchers warn of a cyber attack abusing Velociraptor, an open-source forensic tool, to create tunnels to attacker-controlled servers. This marks a tactical evolution, leveraging legitimate software for malicious purposes. Organizations should monitor for unauthorized use of Velociraptor as a potential ransomware precursor.

Pro Dashboard

Hot Take:

Behold the rise of cyber Jurassic Park, where Velociraptor isn’t just a dinosaur but the latest weapon in a hacker’s arsenal. Who knew the age-old battle of good versus evil would take a prehistoric twist? I guess when life finds a way, so do cybercriminals!

Key Points:

  • Cyber attackers are misusing Velociraptor, an open-source tool, to facilitate malicious activities.
  • The tactic involves downloading and executing Visual Studio Code to establish a command-and-control server connection.
  • Attackers leverage the msiexec utility to deploy additional tools like Radmin and Cloudflare tunneling utility.
  • Microsoft Teams is being weaponized for malware deployment, bypassing traditional email defenses.
  • A new malvertising campaign uses legitimate Microsoft links to redirect users to phishing pages.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here
The Nimble Nerd
Confessional Booth of Our Digital Sins

Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?