Security Spotlight: Navigating the Cybersecurity Landscape and Illuminating the Dark Corners of the Web

WME Cybersecurity Briefings No. 004

Mispadu Trojan Exploits Windows Vulnerability to Target Financial Data


The Mispadu banking trojan has intensified its operations as it’s exploiting an already patched Windows SmartScreen flaw. Since its initial identification in 2019, Mispadu has primarily preyed on users in Mexico through phishing emails. Its aim has been to steal banking details and personal information.


Mispadu has improved its ability to evade detection and successfully harvest sensitive data. This presents huge risks to both individuals and fintech organizations.


Both Individuals and organizations should keep their software up to date. Employ comprehensive anti-malware solutions and educate yourself on identifying phishing attempts. Also, Fintech organizations should bolster their fraud detection mechanisms to mitigate unauthorized transactions promptly.

Chinese Hackers Deploy Stealthy Malware, UNAPIMON


UNAPIMON is a cunning malware that operates under the radar. It leverages a simple C++ codebase and employs techniques specially designed to evade detection. It utilizes DLL hijacking, tricking legitimate applications into loading the malware’s code instead of their intended libraries. This allows the malware to operate within a trusted process, making it less conspicuous to security measures. The malware is linked to a threat actor group, Earth Freybug.

Impact & Concerns

Their financially motivated attacks target various sectors and countries. A technique they use, API unhooking, has enabled them to disable specific API functions that monitor system activity, allowing them to bypass detection.

The specific functionalities of UNAPIMON are still under investigation. However, its association with Earth Freybug raises concerns. Given Earth Freybug’s history, UNAPIMON could be used to gather sensitive data from targeted organizations.


  • Ensure your OS and Apps are patched.
  • Utilize a robust security solution to prevent various threats.
  • Be wary of phishing attempts. Remain cautious of unsolicited emails, especially those with attachments.

Google Set to Erase Billions of Browsing Records in Privacy Lawsuit Settlement


Google agrees to delete billions of browsing data records collected from users in “incognito” browsing mode. This settlement comes after a class-action lawsuit filed in 2020. The allegation says Google misled users by continuing to track their browsing activity even when they opted to keep it private.

Privacy Concerns Fueled the Lawsuit:

The lawsuit centered around the idea that users who activate “incognito mode” expect a certain level of privacy. They believe their browsing history wouldn’t be collected by Google. However, the lawsuit claimed Google continued to gather data.


This settlement has significant implications for user privacy online. It sets a precedent for holding tech giants accountable for their data collection practices. Billions of event-level data records will be purged, which is good news for users’ private browsing activities. The exact details of what data will be deleted are still being finalized and await court approval.

Looking Ahead

It’s important to note that incognito mode isn’t a foolproof shield for online anonymity. It primarily prevents your browsing history from being saved locally on your device. This settlement, however, sheds light on the ongoing conversation about the importance of clear communication.

Phishing Frenzy: Malicious Campaign Targets Latin America


A large-scale phishing campaign emerges, targeting various sectors across Latin America to deploy a nasty piece of malware, Venom RAT (Remote Access Trojan). The malicious operation is being attributed to the cyber threat actor TA558.

Widespread Targeting

The attackers aren’t picky. Their sights are set on various industries in the Latin region, including:

  • Hospitality
  • Fintech Services
  • Manufacturing & Industries
  • Agencies

Impact of the Targeting

The ultimate goal of this phishing campaign is to deliver Venom RAT. Once installed on a victim’s machine, attackers can access systems remotely. Ultimately, they can steal sensitive info, spy on users, and potentially disrupt critical systems.

TA558: A History of Malicious Activity

TA558 isn’t a newcomer to the cybercrime scene. They’ve been active since at least 2018, with a history of targeting Latin American entities. They’ve been known to deploy various malware strains i.e. Loda RAT, Vjw0rm, Revenge RAT, etc.

How to Stay Safe from Phishing Attacks?

  • Be Wary of Unsolicited Emails
  • Verify Sender Info
  • Don’t Rush, Double-Check
  • Maintain Security Software
  • Stay Informed

US Charges and Sanctions Chinese Hacking Group APT31

The US Department of Justice (DOJ) unsealed an indictment against seven individuals believed to be affiliated with the Chinese state-sponsored hacking group APT31 (AKA Zirconium). The individuals were charged with computer intrusions and wire fraud related to a cyberespionage campaign targeting US entities and perceived critics of China.

Accusations of Widespread Espionage

The indictment accuses APT31 of conducting a long-term cyberespionage campaign spanning over a decade. It alleges the group engaged in the following activities:

  • Hacking emails belonging to US businesses and individuals critical of China.
  • Exploiting software vulnerabilities and trade espionage.

Impact: Sanctions Imposed

The Treasury Department imposed sanctions against the individuals and the alleged front company. The sanctions aim to restrict the financial resources available to the group and disrupt their operations.

China’s Response

They have consistently denied allegations of state-sponsored cyberattacks. In response to the US actions against APT31, China has accused the US of spreading misinformation.


The US sanctions against APT31 highlight the growing tensions over cyberespionage between the US and China. They also highlight the importance of cybersecurity measures for private businesses and individuals.

Ransomware Attack Triggers State of Emergency in Missouri County

Target: Jackson County, Missouri


The county experienced a ransomware attack on the day of a special election, disrupting multiple county IT systems.


  • Unexplained IT outages initially alerted officials to a potential issue.
  • The specific functionalities that ransomware affected have not been explicitly disclosed.
  • However, the disruption likely impacted various county services that rely on IT systems.


  • Jackson County Executive Frank White Jr. declared a state of emergency “as a proactive measure” to facilitate a faster response and resource allocation.
  • County officials brought in third-party cybersecurity experts and law enforcement to investigate the incident.


Officials expressed confidence in a swift recovery due to “investments made in our cybersecurity infrastructure.”



Investigators haven’t found any evidence of stolen data so far. This is likely because the county reportedly keeps its financial data on a separate system managed by a third party.
However, the incident highlights the importance of cybersecurity preparedness for local governments.

Windows Management Experts

Now A Microsoft Solutions Partner for:  

  • Data & AI
  • Digital and App Innovation
  • Infrastructure
  • Security

The Solutions Partner badge highlights WME’s excellence and commitment. Microsoft’s thorough evaluation ensures we’re skilled, deliver successful projects, and prioritize security over everything. This positions WME in a global tech community, ready to innovate on the cloud for your evolving business needs.

Microsoft Solutions Partner Logos - Data & AI PNG
Microsoft Solutions Partner Logos - Digital & App Innovation PNG
Microsoft Solutions Partner Logos - Infrastructure PNG
Microsoft Solutions Partner Logos - Security PNG

Why not reach out to us at WME?

Contact us and let us transform your business’s security into a strategic advantage for your business. Be sure, with WME, you’re just beginning a path toward a more streamlined and secure future.

501 Cambria Ave. STE #384,
Bensalem, PA 19020

Phone: (888) 307-0133
Press 1 at the Menu

WME Cybersecurity Briefings

Footer - 2023-11-07
Be assured of everything

Get WME Services

Stay ahead of the competition with our Professional IT offerings.