GoSecure Blog
Identifying and Investigating Suspicious Outbound TLD Traffic
Cybercriminals are constantly finding new ways to bypass traditional security measures, and one of their latest tactics involves using obscure Top-Level Domains (TLDs) to facilitate malicious activities. From data exfiltration and phishing to command-and-control (C2) operations, these domains provide attackers with an easy way to evade detection.
Oracle Cloud Breach: A Strategic Response to an Identity-Layer Threat
On March 21, 2025, security researchers identified a threat actor, operating under the alias rose87168, attempting to sell over six million records allegedly exfiltrated from Oracle Cloud’s Single Sign-On (SSO) and LDAP services. This breach is suspected to stem from a vulnerability within the login infrastructure of login.(region-name).oraclecloud.com.
Talk To Your Malware – Integrating AI Capability in an Open-Source C2 Agent
TL;DR
Introducing malware (implants) that uses AI to generate and execute code. Operators can now simply “talk” to their implants, and it will magically execute the requested instructions. For example, an operator could say: “Scan every user’s home folder and pack any office file under 2MB inside a single archive saved in C:/test/output.zip“, and the implant would obey.
This has several advantages:
Threat Hunt of the Month: Rhysida Ransomware Group Targeting VPNs and Search Engine Poisoning
In February 2025, GoSecure Threat Hunters identified Rhysida, a ransomware group actively exploiting stolen VPN credentials and search engine poisoning to infiltrate corporate networks. Rhysida’s double-extortion tactics involve encrypting files while threatening to leak stolen sensitive data. The group has been observed delivering malware disguised as legitimate software, such as Microsoft Teams or Google Chrome, via poisoned search results. Once installed, the malware establishes persistence through scheduled tasks and executes via rundll32.exe, providing long-term access to compromised systems.
Unlocking the Full Potential of Microsoft Defender XDR with GoSecure
Organizations that rely on Microsoft Defender XDR (Extended Detection and Response) understand the importance of a comprehensive cybersecurity strategy. Microsoft’s native security tools provide robust protection, but sophisticated threats require an added layer of expert-driven analysis, proactive threat hunting, and real-time response capabilities. This is where GoSecure Titan® Managed Extended Detection & Response (MXDR) for Microsoft delivers a critical advantage.