FedEx Database Access Allegedly Sold on Cybercrime Forum via Insider

FedEx Database Access Allegedly Sold on Cybercrime Forum via Insider

A threat actor is allegedly selling live access to FedEx's internal database through an insider, according to a post on a cybercrime forum.

The seller claims the access enables searching shipments by sender, viewing recipient and shipper details, sorting deliveries by location and package attributes, and the ongoing ability to work with others to target specific shipments.

Insider Threat

Unlike typical data breaches involving stolen databases, this listing advertises continuous access allegedly provided by someone within FedEx's operations. If legitimate, this would allow buyers to identify and potentially intercept high-value shipments in real-time.

Unverified Claims

The authenticity of the alleged access has not been independently verified. FedEx has not publicly commented on any insider compromise. Claims of insider access on cybercrime forums are sometimes exaggerated or fabricated to attract buyers.

Supply Chain Implications

Access to logistics data poses risks beyond customer privacy. Threat actors could use shipment information to identify valuable packages for theft, track executive movements, or gather intelligence on business operations.

Organizations relying on FedEx for sensitive shipments should monitor for any unusual activity and consider additional security measures for high-value deliveries.

Read more

ClickFix Campaign Compromises Legitimate Sites to Deploy MIMICRAT — A Custom C++ RAT With 22 Post-Exploitation Commands

ClickFix Campaign Compromises Legitimate Sites to Deploy MIMICRAT — A Custom C++ RAT With 22 Post-Exploitation Commands

Elastic Security Labs has disclosed a new ClickFix campaign that leverages compromised legitimate websites as delivery infrastructure to deploy a previously undocumented remote access trojan dubbed MIMICRAT (also tracked as AstarionRAT). The campaign, discovered earlier this month, demonstrates significant operational sophistication — from multi-stage PowerShell chains that bypass Windows security controls

By Zero Day Wire
ShinyHunters Linked to Device Code Vishing Attacks Targeting Microsoft Entra Accounts via OAuth 2.0 Abuse

ShinyHunters Linked to Device Code Vishing Attacks Targeting Microsoft Entra Accounts via OAuth 2.0 Abuse

A new wave of attacks is combining voice phishing (vishing) with OAuth 2.0 device authorization abuse to compromise Microsoft Entra accounts at technology, manufacturing, and financial organizations — bypassing traditional phishing infrastructure entirely. Sources told BleepingComputer they believe the ShinyHunters extortion gang is behind the campaigns, which the threat actors

By Zero Day Wire