Tag: hacker
-
Medusa Ransomware: Hacker machen Öffentlichkeitsarbeit
by
in SecurityNewsAuch Cyberkriminelle pflegen neben der direkten Kommunikation mit dem Opfer ihre Außendarstellung. Denn Reputation ist ein wichtiger Erfolgsfaktor für Ransomware-as-a-Service-Unternehmen. Der Großteil der Öffentlichkeitsarbeit findet im Darknet statt. First seen on it-daily.net Jump to article: www.it-daily.net/it-sicherheit/cybercrime/medusa-ransomware-hacker-machen-oeffentlichkeitsarbeit
-
French ISP Free confirms data breach after hacker puts customer data up for auction
by
in SecurityNewsOne of the largest internet providers in France, Free S.A.S, has confirmed that it recently suffered a cybersecurity breach after a hacker attempted t… First seen on bitdefender.com Jump to article: www.bitdefender.com/en-us/blog/hotforsecurity/french-isp-free-confirms-data-breach-after-hacker-puts-customer-data-up-for-auction/
-
T-Mobile rebuffed breach attempts by hackers likely connected to China’s Salt Typhoon
by
in SecurityNewsFirst seen on therecord.media Jump to article: therecord.media/tmobile-salt-typhoon-hacking-china
-
When Hackers Meet Tractors: Surprising Roles in IoT Security
by
in SecurityNewsHow to Find a Career in Industrial IoT – on the Factory Floor or in the Cornfield Cybersecurity once conjured images of IT departments, server rooms and corporate firewalls. Today, it extends far beyond these traditional domains, becoming essential in fields like manufacturing, agriculture, healthcare, transportation, robotics and space exploration. First seen on govinfosecurity.com Jump…
-
Hackers abuse popular Godot game engine to infect thousands of PCs
by
in SecurityNewsHackers have used new GodLoader malware exploiting the capabilities of the widely used Godot game engine to evade detection and infect over 17,000 systems in just three months. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/new-godloader-malware-infects-thousands-of-gamers-using-godot-scripts/
-
Chinese hackers eyeing U.S. critical infrastructure for potential conflict
by
in SecurityNewsFirst seen on scworld.com Jump to article: www.scworld.com/brief/chinese-hackers-eyeing-u-s-critical-infrastructure-for-potential-conflict
-
Script Kiddie ‘Matrix’ Builds Massive Botnet
by
in SecurityNewsLikely Russian Hacker Exploits IoT Vulnerabilities, Many Known for Years. An apparent Russian script kiddie is converting widespread security gaps into powerful botnets capable of launching global-scale distributed denial-of-service attacks. A threat actor with the online moniker Matrix is exploiting IoT vulnerabilities such as default credentials and outdated software. First seen on govinfosecurity.com Jump to…
-
T-Mobile says telco hackers had ‘no access’ to customer call and text message logs
The phone giant said hackers did not access the contents or logs of customer phone calls or text messages, during an industry-wide attack on phone and internet companies. First seen on techcrunch.com Jump to article: techcrunch.com/2024/11/27/t-mobile-says-telco-hackers-had-no-access-to-customer-call-and-text-message-logs/
-
US Appeals Court Reverses Tornado Cash Sanctions
by
in SecurityNewsDepartment of Treasury Overstepped its Authority, Fifth Circuit Rules. A U.S. federal appeals court ruled U.S. Department of Treasury exceeded its authority by sanctioning Tornado Cash, a cryptocurrency mixing service used by North Korean hackers to launder more than $455 million. Smart contracts are not capable of being owned, the court ruled. First seen on…
-
Russian Hackers Exploit Firefox and Windows 0-Days to Deploy Backdoor
Watch out for the Russian hackers from the infamous RomRom group, also known as Storm-0978, Tropical Scorpius, or UNC2596, and their use of a custom backdoor. First seen on hackread.com Jump to article: hackread.com/russian-hackers-firefox-windows-0-days-backdoor/
-
Chinese hackers breached T-Mobile’s routers to scope out network
T-Mobile says the Chinese “Salt Typhoon” hackers who recently compromised its systems as part of a series of telecom breaches first hacked into some of its routers to explore ways to navigate laterally through the network. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/chinese-hackers-breached-t-mobiles-routers-to-scope-out-network/
-
Lazarus Hackers Exploits macOS Extended Attributes To Evade Detection
by
in SecurityNewsThe xattr command in Unix-like systems allows for the embedding of hidden metadata within files, similar to Windows ADS, known as Rustyattr, which is being exploited by threat actors like Lazarus Group to stealthily conceal malicious payloads within seemingly benign files. The Lazarus Group is covertly embedding malicious data within system files using xattr, a…
-
APT60 Hackers Exploit StatCounter and Bitbucket in SpyGlace Malware Campaign
The threat actor known as APT-C-60 has been linked to a cyber attack targeting an unnamed organization in Japan that used a job application-themed lure to deliver the SpyGlace backdoor.That’s according to findings from JPCERT/CC, which said the intrusion leveraged legitimate services like Google Drive, Bitbucket, and StatCounter. The attack was carried out around August…
-
Kein Klick nötig: Russische Hacker attackieren Windows-Nutzer via Firefox
by
in SecurityNewsFür einen erfolgreichen Angriff reicht der bloße Besuch einer speziell präparierten Webseite. Deutschland ist bei den Zielregionen ganz vorne mit dabei. First seen on golem.de Jump to article: www.golem.de/news/kein-klick-noetig-russische-hacker-attackieren-windows-nutzer-via-firefox-2411-191188.html
-
A US soldier is suspected of being behind the massive Snowflake data leak
by
in SecurityNewsOne of the hackers who masterminded the Snowflake credential leak that led to the threat actors stealing data from and extorting at least 165 companies, including 560 million Ticketmaster and 110 AT&T customers, could be a US soldier, according to cybersecurity journalist Brian Krebs.The hacker, known for using the moniker Kiberphant0m, carried out online chats…
-
Russian RomCom APT Group Leverages Zero-Day Flaws in Firefox and Windows
by
in SecurityNewsRussia-backed hackers, known as RomCom, have exploited critical zero-day vulnerabilities in Mozilla Firefox and Windows to launch targeted attacks First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/romcom-apt-zeroday-flaws-firefox/
-
Hackers Exploit Firefox and Windows Flaws: RomCom’s Advanced Attack Unveiled
by
in SecurityNewsA Russia-aligned hacking group, known as RomCom (also identified as Storm-0978, Tropical Scorpius, or UNC2596), has successfully exploited two zero-day vulnerabilities”, one in Mozilla Firefox and another in Microsoft Windows Task Scheduler. These vulnerabilities, identified as CVE-2024-9680 and CVE-2024-49039, were chained together to allow the group to execute arbitrary code and install malicious backdoors on…
-
Russian Hackers Target Mozilla, Windows in New Exploit Chain
by
in SecurityNewsESET Discovers Two Major Vulnerabilities Exploited by Russian RomCom Hacking Group. Two vulnerabilities in Mozilla products and Windows are actively exploited by RomCom, a Kremlin-linked cybercriminal group known for targeting businesses and conducting espionage, warn security researchers from Eset. Exploiting the two flaws together enables attackers to execute arbitrary code. First seen on govinfosecurity.com Jump…
-
Russian hackers exploit Firefox, Windows zero-days in wild
by
in SecurityNewsRomCom threat actors chain two Firefox and Windows zero-day vulnerabilities together in order to execute arbitrary code in vulnerable Mozilla browsers. First seen on Jump to article: /www.techtarget.com/searchsecurity/news/366616460/Russian-hackers-exploit-Firefox-Windows-zero-days-in-wild
-
Russia-linked hackers exploited Firefox and Windows bugs in ‘widespread’ hacking campaign
by
in SecurityNewsThe Russia-aligned RomCom gang exploited the vulnerabilities to target hundreds of Firefox users across Europe and North America. First seen on techcrunch.com Jump to article: techcrunch.com/2024/11/26/russia-linked-hackers-exploited-firefox-and-windows-zero-day-bugs-in-widespread-hacking-campaign/
-
Starbucks von Ransomware-Attacke auf Supply-Chain-Anbieter Blue Yonder betroffen
by
in SecurityNews‘Hacker haben es geschafft, einige der größten Einzelhandels- und Kaffeeketten der Welt in einer der geschäftigsten Wochen des Jahres anzugreifen. In den USA wird diese Woche Thanksgiving gefeiert. Dies zeigt einmal mehr, wie der Angriff auf ein einzelnes Unternehmen Zugang zu einem ganzen Ökosystem verschaffen kann in diesem Fall zu einer Zeit, in der […]…
-
RomCom Hackers Exploits Windows Firefox Zero-Day in Advanced Cyberattacks
by
in SecurityNewsIn a new wave of cyberattacks, the Russia-aligned hacking group >>RomCom>The compromise chain is composed of a […] The post RomCom Hackers Exploits Windows & Firefox Zero-Day in Advanced Cyberattacks appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform. First seen on gbhackers.com Jump to article: gbhackers.com/romcom-hackers-exploits-windows-firefox-zero-day/
-
‘Matrix’ Hackers Deploy Massive New IoT Botnet for DDoS Attacks
Aqua Nautilus researchers have discovered a campaign powering a series of large-scale DDoS attacks launched by Matrix, which… First seen on hackread.com Jump to article: hackread.com/matrix-hackers-new-iot-botnet-ddos-attacks/
-
Video: Cybersecurity Tips for Small Businesses
by
in SecurityNewsAre you protecting your small business from hackers? This video will teach you about common cyber threats and how to safeguard your business from attacks. First seen on esecurityplanet.com Jump to article: www.esecurityplanet.com/video/cybersecurity-tips-for-small-businesses/
-
Chinese APT Hackers Using Multiple Tools And Vulnerabilities To Attack Telecom Orgs
by
in SecurityNews
Tags: apt, attack, backdoor, china, control, cyber, exploit, government, group, hacker, infrastructure, rat, tool, vulnerabilityEarth Estries, a Chinese APT group, has been actively targeting critical sectors like telecommunications and government entities since 2023. They employ advanced techniques, including exploiting vulnerabilities, lateral movement, and deploying multiple backdoors like GHOSTSPIDER, SNAPPYBEE, and MASOL RAT, which have impacted Southeast Asia significantly. The group makes use of a sophisticated command and control infrastructure…
-
VMware Patches High-Severity Vulnerabilities in Aria Operations
by
in SecurityNewsThe company warns that malicious hackers can craft exploits to elevate privileges or launch cross-site scripting attacks. The post VMware Patches High-Severity Vulnerabilities in Aria Operations appeared first on SecurityWeek. First seen on securityweek.com Jump to article: www.securityweek.com/vmware-patches-high-severity-vulnerabilities-in-aria-operations/
-
Hackers exploit critical bug in Array Networks SSL VPN products
by
in SecurityNewsAmerica’s Cyber Defense Agency has received evidence of hackers actively exploiting a remote code execution vulnerability in SSL VPN products Array Networks AG and vxAG ArrayOS. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/hackers-exploit-critical-bug-in-array-networks-ssl-vpn-products/
-
Chinese Hackers Exploiting Critical Vulnerability in Array Networks Gateways
by
in SecurityNewsCISA warns about attacks exploiting CVE-2023-28461, a critical vulnerability in Array Networks AG and vxAG secure access gateways. The post Chinese Hackers Exploiting Critical Vulnerability in Array Networks Gateways appeared first on SecurityWeek. First seen on securityweek.com Jump to article: www.securityweek.com/chinese-hackers-exploiting-critical-vulnerability-in-array-networks-gateways/