Cyble Chronicles – December 29: Latest Findings & Recommendations for the Cybersecurity Community
Annual Threat Landscape Report 2023
Cyble Research and Intelligence Labs’ (CRIL) Annual Threat Landscape Report for 2023 is now live!

In 2023, the cyber landscape witnessed unprecedented volatility with ongoing conflicts and a surge in AI adoption by cybercriminals. Major entities worldwide faced relentless cyberattacks, revealing multifaceted threats, from new crime forums to evolving hacktivism tactics. This annual report delves into sectoral and regional trends, offering insights for 2024. Noteworthy takeaways include the rise of new cybercrime forums, a proliferation of incidents, doubling ransomware threats, and a geographical impact spotlighting the United States and India. The threat landscape diversified, emphasizing the urgency for global readiness against mounting cybersecurity risks.
The report also underscores the intensification of hacktivism amid geopolitical volatility, the prevalence of zero-day exploits, and the adoption of new languages like Rust, Go, and Nim in malware development, presenting a diverse and evolving threat landscape that demands heightened preparedness. Arm yourself with a detailed cybersecurity wrap-up of 2023 and insightful predictions for the year to come.
Cyble is now a SOC-compliant firm!

Cyble’s attainment of SOC 2 compliance marks a transformative step in our commitment to delivering exceptional cybersecurity solutions. This framework, designed by the American Institute of CPAs, sets rigorous standards for data security in the cloud. Our success in meeting SOC 2 criteria, covering security, availability, processing integrity, confidentiality, and privacy, distinguishes us as a trusted partner dedicated to industry-leading standards.
Beyond a certification, SOC 2 compliance strategically positions Cyble in a competitive edge. It assures clients of our proactive risk mitigation approach, identifying and addressing potential security risks while enhancing overall operational efficiency. This achievement aligns seamlessly with our mission to provide cutting-edge solutions amid a dynamic cybersecurity landscape. Effortlessly passing the SOC 2 compliance process, from defining scope to continuous monitoring, reflects our unwavering commitment to excellence. This certification is not just a milestone but a continuous pledge to uphold the highest standards in data security. It solidifies Cyble’s position as a reliable and secure choice for clients worldwide seeking cybersecurity partners with a proven dedication to safeguarding sensitive information. Read more about our journey to SOC 2 Compliance and what this means for our user base here
Decoding qBit Stealer’s Source Release and Data Exfiltration Prowess

qBit Stealer, a recently identified cybersecurity threat, has gained significant attention for its sophisticated evasion techniques designed to outsmart Endpoint Detection and Response (EDR) systems and virtualization safeguards. Developed by the QBit Ransomware-as-a-Service (RaaS) group using the Go programming language, this malware sets itself apart by selectively targeting files with specific extensions, suggesting a potential role as an exfiltration tool in ransomware operations.
The malware’s unique file targeting, as revealed by CRIL, aligns with evolving ransomware tactics, particularly in double extortion scenarios. The real danger lies in qBit Stealer potentially serving as a tool for threat actors seeking to exfiltrate critical data before launching a ransomware attack, intensifying the potential harm to targeted entities.
Organizations must heed these findings, educate their workforce about this potent threat, and implement robust security measures, including antivirus software, firewalls, and intrusion detection systems. Recognizing the human element as a crucial defense, fostering a culture of cyber awareness, and conducting regular security training can mitigate the risk of human errors leading to compromises.
qBit’s shift into stealthy, evasive infostealers, as unveiled by CRIL, underscores the heightened danger posed by the threat actors. Further investigation into their present and future activities is imperative. As this malware introduces new challenges, proactive cybersecurity measures, guided by CRIL’s insights, are essential to thwart its impact on both individuals and businesses. Read our detailed analysis of qBit Stealer here.
Yakult Australia falls victim to a data breach

In a troubling development reported by The Cyber Express, Yakult Australia has become the target of a cyberattack leading to a data breach amid the holiday season. The breach, attributed to the DragonForce group, has reportedly exposed over 95GB of sensitive data, including business documents, credit applications, and employee records.
The breach came to light when DragonForce posted a threat on its Onion leak site on December 20, disclosing the breach details and listing the compromised information. Responding promptly, Yakult Australia released an official statement, acknowledging the cybersecurity incident and assuring ongoing operational stability.
Yakult Australia has taken proactive measures, involving cyber incident experts and notifying relevant authorities in Australia and New Zealand. This collaborative effort aims to thoroughly investigate the extent of the breach and mitigate its consequences.
This incident echoes DragonForce’s past attacks on companies like Ace Air Cargo and Kinetic Leasing in the United States, underscoring the wider implications of the cyber threat. The Cyber Express will continue monitoring this unfolding story and provide updates as more information becomes available.



