Tag: malware
-
BadBox malware compromise undettered by sinkhole operation
by
in SecurityNews
Tags: malwareFirst seen on scworld.com Jump to article: www.scworld.com/brief/badbox-malware-compromise-undettered-by-sinkhole-operation
-
Suspected Chinese malware operation HiatusRAT menacing IoT devices
by
in SecurityNewsFirst seen on scworld.com Jump to article: www.scworld.com/news/suspected-chinese-malware-operation-menacing-iot-devices-with-hiatus-rat
-
Best of 2023: Best online .apk virus scanners Hackernet
by
in SecurityNewsThey are a lot of antivirus software and online scanners available to scan antivirus but only some of them work well. Here we listed the Best online .apk virus scanners that scan and compare with the original file version and also check with malware patterns that are available at antivirus providers. These online scanners scan……
-
US charges Russian-Israeli as suspected LockBit ransomware coder
by
in SecurityNewsThe US Department of Justice has charged a Russian-Israeli dual-national for his suspected role in developing malware and managing the infrastructure for the notorious LockBit ransomware group. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/us-charges-russian-israeli-as-suspected-lockbit-ransomware-coder/
-
OT/ICS Engineering Workstations Face Barrage of Fresh Malware
by
in SecurityNewsCyberattacks against OT/ICS engineering workstations are widely underestimated, according to researchers who discovered malware designed to shut down Siemens workstation engineering processes. First seen on darkreading.com Jump to article: www.darkreading.com/vulnerabilities-threats/ot-ics-engineering-workstations-malware
-
In Other News: McDonald’s API Hacking, Netflix Fine, Malware Kills ICS Process
by
in SecurityNewsNoteworthy stories that might have slipped under the radar: McDonald’s API hacking, Netflix fined nearly $5 million in Netherlands, experimental malware killing ICS process. The post In Other News: McDonald’s API Hacking, Netflix Fine, Malware Kills ICS Process appeared first on SecurityWeek. First seen on securityweek.com Jump to article: www.securityweek.com/in-other-news-mcdonalds-hacking-netflix-fine-malware-kills-ics-process/
-
Raspberry-Robin Vielschichtige Verschlüsselung
by
in SecurityNewsDas Zscaler-ThreatLabz-Team entschlüsselte vor kurzem die umfangreichen Verschleierungstechniken von Raspberry-Robin (auch bekannt als Roshtyak). Die Malware befindet sich seit 2021 im Umlauf und verbreitet sich hauptsächlich über infizierte USB-Geräte, so dass nach wie vor eine Gefahr zur Infektion von Windows-Systemen davon ausgeht. Hauptaufgabe von Raspberry-Robin ist das Nachladen und Ausführen der Payload auf einem kompromittierten…
-
Threat Actors Selling Nunu Stealer On Hacker Forums
A new malware variant calledNunu Stealeris making headlines after being advertised on underground hacker forums and Telegram channels. Priced at $100 per month, this malicious tool is gaining attention for its extensive capabilities and potential to wreak havoc on individuals and organizations alike. According to a post shared by a ThreatMon on X, the malware…
-
Webcams and DVRs Vulnerable to HiatusRAT, FBI Warns
by
in SecurityNewsThe FBI has issued a warning about the Hiatus RAT malware targeting Xiongmai and Hikvision web cameras and DVRs, urging users isolate these devices from networks First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/webcams-vulnerable-hiatusrat-fbi/
-
Lazarus Group Spotted Targeting Nuclear Engineers with CookiePlus Malware
The Lazarus Group, an infamous threat actor linked to the Democratic People’s Republic of Korea (DPRK), has been observed leveraging a “complex infection chain” targeting at least two employees belonging to an unnamed nuclear-related organization within the span of one month in January 2024.The attacks, which culminated in the deployment of a new modular backdoor…
-
Neue IOCONTROL-Malware bei Angriffen auf KRITIS entdeckt
by
in SecurityNewsEine neue Malware namens IOCONTROL befällt Geräte des Internet of Things (IoT) und OT/SCADA-Systeme, die von kritischen Infrastrukturen in den USA und Israel genutzt werden. First seen on it-daily.net Jump to article: www.it-daily.net/it-sicherheit/cybercrime/neue-iocontrol-malware-bei-angriffen-auf-kritis-entdeckt
-
Rspack npm Packages Compromised with Crypto Mining Malware in Supply Chain Attack
by
in SecurityNewsThe developers of Rspack have revealed that two of their npm packages, @rspack/core and @rspack/cli, were compromised in a software supply chain attack that allowed a malicious actor to publish malicious versions to the official package registry with cryptocurrency mining malware.Following the discovery, versions 1.1.7 of both libraries have been unpublished from the npm registry.…
-
Juniper warns of Mirai botnet scanning for Session Smart routers
Juniper Networks has warned customers of Mirai malware attacks scanning the Internet for Session Smart routers using default credentials. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/juniper-warns-of-mirai-botnet-scanning-for-session-smart-routers/
-
Raspberry Robin: Vielschichtige Verschlüsselung
by
in SecurityNewsDas Zscaler ThreatLabz-Team entschlüsselte vor kurzem die umfangreichen Verschleierungstechniken von Raspberry Robin (auch bekannt als Roshtyak). Die Malware befindet sich seit 2021 im Umlauf und verbreitet sich hauptsächlich über infizierte USB-Geräte, so dass nach wie vor eine Gefahr zur Infektion von Windows-Systemen davon ausgeht. First seen on it-daily.net Jump to article: www.it-daily.net/it-sicherheit/cybercrime/raspberry-robin-vielschichtige-verschluesselung
-
Cybersicherheit 2025: Der Schutz industrieller Systeme ist entscheidend
by
in SecurityNewsIm Jahr 2025 wird die OT-Cybersicherheit (Operational Technology) eine Schlüsselrolle beim Schutz industrieller Umgebungen und kritischer Infrastrukturen spielen. Phil Tonkin, Field CTO von Dragos warnt: »Die zunehmende Vernetzung durch die digitale Transformation legt Sicherheitslücken in OT-Systemen offen, die oft ohne Berücksichtigung moderner Bedrohungen entwickelt wurden.« Wachsende Bedrohungen für OT-Systeme Bedrohungen wie die FrostyGoop-Malware, die… First…
-
TA397 Leverages Sophisticated Spearphishing Techniques to Deploy Malware in Defense Sector
by
in SecurityNewsProofpoint researchers have identified a new spearphishing campaign by TA397, a South Asia-based advanced persistent threat (APT) group also known as Bitter. The campaign, observed on November 18, 2024, targets... First seen on securityonline.info Jump to article: securityonline.info/ta397-leverages-sophisticated-spearphishing-techniques-to-deploy-malware-in-defense-sector/
-
Crypto Roundup: LastPass Breach Linked to $5.4M Crypto Theft
by
in SecurityNewsAlso, CoinLurker Malware Steals Data via Fake Updates. Every week, Information Security Media Group rounds up cybersecurity incidents in digital assets. This week, LastPass breach linked to $5.4M crypto theft, CoinLurker malware steals data via fake updates, cryptocurrency key to 27 million euro seizure and nearly 800 arrested in crypto-romance scam. First seen on govinfosecurity.com…
-
BadBox malware botnet infects 192,000 Android devices despite disruption
by
in SecurityNewsThe BadBox Android malware botnet has grown to over 192,000 infected devices worldwide despite a recent sinkhole operation that attempted to disrupt the operation in Germany. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/badbox-malware-botnet-infects-192-000-android-devices-despite-disruption/
-
DarkGate malware spread via Microsoft Teams, AnyDesk
by
in SecurityNewsFirst seen on scworld.com Jump to article: www.scworld.com/brief/darkgate-malware-spread-via-microsoft-teams-anydesk
-
Android malware found on Amazon Appstore disguised as health app
A malicious Android spyware application named ‘BMI CalculationVsn’ was discovered on the Amazon Appstore, masquerading as a simple health tool but stealing data from infected devices in the background. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/android-spyware-found-on-amazon-appstore-disguised-as-health-app/
-
Juniper warns of Mirai botnet targeting Session Smart routers
Juniper Networks has warned customers of Mirai malware attacks targeting and infecting Session Smart routers using default credentials. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/juniper-warns-of-mirai-botnet-targeting-session-smart-routers/
-
Malvertisers Fool Google With AI-Generated Decoy Content
by
in SecurityNewsSeemingly innocent white pages, including an elaborate Star Wars-themed site, are bypassing Google’s malvertising filters, showing up high in search results to lure users to second-stage phishing sites. First seen on darkreading.com Jump to article: www.darkreading.com/cloud-security/malvertisers-fool-google-ai-generated-decoy-content
-
Ukrainian sentenced to five years in jail for work on Raccoon Stealer
by
in SecurityNewsUkrainian national Mark Sokolovsky was sentenced Wednesday to five years in federal prison for his role in operating Raccoon Infostealer malware, which infiltrated millions of computers worldwide to steal personal data. According to court documents, Sokolovsky, 28, was integral to operations that allowed the leasing of Raccoon Infostealer for $200 per month, payable via cryptocurrency.…
-
New Malware Can Kill Engineering Processes in ICS Environments
by
in SecurityNews
Tags: malwareForescout identified a new type of malware capable of terminating engineering processes, used to target Siemens engineering workstations First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/malware-engineering-ics/
-
Sandworm-linked hackers target users of Ukraine’s military app in new spying campaign
Russian hackers are creating fraudulent websites that mimic the official page of Army+, a Ukrainian military app, with the goal of spreading malware for espionage.]]> First seen on therecord.media Jump to article: therecord.media/ukraine-military-app-espionage-russia-sandworm
-
Beware Of Malicious SharePoint Notifications That Delivers Xloader Malware
by
in SecurityNewsThrough the use of XLoader and impersonating SharePoint notifications, researchers were able to identify a sophisticated malware delivery campaign. A link that was disguised as a legitimate SharePoint notification was included in the emails that were sent out at the beginning of the attack. The engine flagged the message as malicious based on several factors:…
-
Hackers Weaponizing LNK Files To Create Scheduled Task And Deliver Malware Payload
by
in SecurityNewsTA397, also known as Bitter, targeted a Turkish defense organization with a spearphishing email containing a RAR archive, which included a decoy PDF, a malicious LNK file disguised as a PDF, and an ADS file with PowerShell code. This technique, common for TA397, leverages NTFS ADS to establish persistence and deploy further malware like wmRAT…
-
BADBOX Botnet Hacked 74,000 Android Devices With Customizable Remote Codes
by
in SecurityNewsBADBOX is a cybercriminal operation infecting Android devices like TV boxes and smartphones with malware before sale, which are often sold through reputable retailers and pose a significant threat to users due to their pre-installed malicious software, making detection challenging. It previously thought eradicated has resurfaced with a significantly expanded reach, infecting over 192,000 Android…
-
UAC-0125 Abuses Cloudflare Workers to Distribute Malware Disguised as Army+ App
The Computer Emergency Response Team of Ukraine (CERT-UA) has disclosed that a threat actor it tracks as UAC-0125 is leveraging Cloudflare Workers service to trick military personnel in the country into downloading malware disguised as Army+, a mobile app that was introduced by the Ministry of Defence back in August 2024 in an effort to…
-
Fake CAPTCHAs Deliver Lumma Infostealer Malware in Massive Malvertising Campaign
by
in SecurityNewsA large-scale malvertising campaign analyzed by Guardio Labs exposes how fake CAPTCHA prompts are used to deliver the Lumma infostealer malware. This sophisticated operation highlights the dark side of Internet... First seen on securityonline.info Jump to article: securityonline.info/fake-captchas-deliver-lumma-infostealer-malware-in-massive-malvertising-campaign/