Tag: malware
-
macOS HM Surf vuln might already be under exploit by major malware family
by
in SecurityNewsFirst seen on theregister.com Jump to article: www.theregister.com/2024/10/21/microsoft_macos_hm_surf/
-
Black Lotus, Emotet, Beep, and Dark Pink, still the top malware threats of 2024
by
in SecurityNewsFirst seen on scworld.com Jump to article: www.scworld.com/perspective/black-lotus-emotet-beep-and-dark-pink-still-the-top-malware-threats-of-2024
-
Botnet exploits GeoVision zero-day to install Mirai malware
by
in SecurityNewsA malware botnet is exploiting a zero-day vulnerability in end-of-life GeoVision devices to compromise and recruit them for likely DDoS or cryptomining attacks. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/botnet-exploits-geovision-zero-day-to-install-mirai-malware/
-
Iranian Hackers Deploy WezRat Malware in Attacks Targeting Israeli Organizations
by
in SecurityNewsCybersecurity researchers have shed light on a new remote access trojan and information stealer used by Iranian state-sponsored actors to conduct reconnaissance of compromised endpoints and execute malicious commands.Cybersecurity company Check Point has codenamed the malware WezRat, stating it has been detected in the wild since at least September 1, 2023, based on artifacts uploaded…
-
Glove Stealer Malware Bypasses Chrome’s App-Bound Encryption
by
in SecurityNewsThe Glove Stealer malware leverages a recently disclosed App-Bound encryption bypass method in attacks. The post Glove Stealer Malware Bypasses Chrome’s App-Bound Encryption appeared first on SecurityWeek. First seen on securityweek.com Jump to article: www.securityweek.com/glove-stealer-malware-bypasses-chromes-app-bound-encryption/
-
Cyber crooks push Android malware via letter
by
in SecurityNewsCyber crooks are trying out an interesting new approach for getting information-stealing malware installed on Android users’ smartphones: a physical letter impersonating … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2024/11/15/android-malware-via-letter/
-
Aktueller Malware-Schutz wehrt Cyberbedrohungen auf Backup-Systeme ab
by
in SecurityNewsLaut Statista kam es im letzten Jahr weltweit zu rund 6 Milliarden Malware-Angriffen. Diese Bedrohungen werden fortlaufend raffinierter und nehmen immer häufiger die Backups von Unternehmen ins Visier. Da Cyberkriminelle ihre Methoden ständig verfeinern und dabei obendrein auf KI setzen, müssen im Gegenzug auch Unternehmen ihre Abwehrmethoden weiterentwickeln. Das ist mehr als überfällig. Beispielsweise sind…
-
Vietnamese Hacker Group Deploys New PXA Stealer Targeting Europe and Asia
by
in SecurityNewsA Vietnamese-speaking threat actor has been linked to an information-stealing campaign targeting government and education entities in Europe and Asia with a new Python-based malware called PXA Stealer.The malware “targets victims’ sensitive information, including credentials for various online accounts, VPN and FTP clients, financial information, browser cookies, and data from gaming software,” First seen on…
-
Cybercriminals Launch SEO Poisoning Attack to Lure Shoppers to Fake Online Stores
by
in SecurityNewsThe research revealed how threat actors exploit SEO poisoning to redirect unsuspecting users to malicious e-commerce websites, leveraging multiple SEO malware families to achieve their goal. Three distinct threat actor groups were identified, each employing a unique malware family, with one group utilizing multiple families. One malware family’s C&C servers shared limited e-commerce site sets,…
-
Sicherheitsfunktionen: Android soll Scam-Anrufe und Malware-Apps besser erkennen
by
in SecurityNewsNeue Sicherheitsmechanismen sollen Besitzer von Androidgeräten noch effektiver vor Betrügern schützen. Das gilt vorerst aber nur für die Pixel-Reihe. First seen on heise.de Jump to article: www.heise.de/news/Sicherheitsfunktionen-Android-soll-Scam-Anrufe-und-Malware-Apps-besser-erkennen-10036429.html
-
New Android Banking Malware ‘ToxicPanda’ Targets Users with Fraudulent Money Transfers
by
in SecurityNewsOver 1,500 Android devices have been infected by a new strain of Android banking malware called ToxicPanda that allows threat actors to conduct fraudu… First seen on thehackernews.com Jump to article: thehackernews.com/2024/11/new-android-banking-malware-toxicpanda.html
-
Iranian Threat Actors Mimic North Korean Job Scam Techniques
by
in SecurityNewsTehran Baits Aerospace Sector into Downloading Malware With Fake Job Offers. Iranian state hackers are taking a page out of North Korean tactics to entice job seekers into downloading malware, with security researchers spotting a Tehran campaign directed against the aerospace industry. It’s possible that Pyongyang shared its attack methods and tools. First seen on…
-
Fortinet patches VPN app flaw that could give rogue users, malware a privilege boost
Plus a bonus hard-coded local API key First seen on theregister.com Jump to article: www.theregister.com/2024/11/14/fortinet_vpn_authentication_bypass_bug/
-
Hackers Lurking in Critical Infrastructure to Wage Attacks
by
in SecurityNewsAustralian Government Warns of Nation-State Actors’ Plans to Weaponize Malware. The Australian government is alerting critical infrastructure providers that state-sponsored actors are positioning malware in their networks that can be weaponized to disrupt operations during major crises or a military conflict. The hackers employ living-off-the-land technique to avoid detection. First seen on govinfosecurity.com Jump to…
-
Chinese malware attack hits Tibetan websites
by
in SecurityNewsFirst seen on scworld.com Jump to article: www.scworld.com/brief/chinese-malware-attack-hits-tibetan-websites
-
New Glove infostealer malware bypasses Chrome’s cookie encryption
by
in SecurityNewsNew Glove Stealer information-stealing malware can bypass Google Chrome’s Application-Bound (App-Bound) encryption to steal browser cookies. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/new-glove-infostealer-malware-bypasses-google-chromes-cookie-encryption/
-
Blinded by Silence
by
in SecurityNews
Tags: access, antivirus, attack, backdoor, breach, control, credentials, crowdstrike, cybersecurity, data, defense, detection, edr, endpoint, exploit, extortion, firewall, github, malicious, malware, microsoft, mitre, monitoring, network, open-source, phone, ransomware, risk, service, siem, sophos, threat, tool, update, vulnerability, windowsBlinded by Silence: How Attackers Disable EDR Overview Endpoint Detection and Response systems (EDRs) are an essential part of modern cybersecurity strategies. EDR solutions gather and analyze data from endpoints to identify suspicious activities and provide real-time threat visibility. This allows security teams to respond quickly to incidents, investigate threats thoroughly, and mitigate the impact of…
-
Malware being delivered by mail, warns Swiss cyber agency
by
in SecurityNewsFirst seen on therecord.media Jump to article: therecord.media/malware-delivered-by-mail-swiss-cyber-agency
-
Cryptohack Roundup: FTX Files Lawsuits to Recover Funds
Also: Arrests in $232M Scam, Guilty Plea in $73M Pig-Butchering Case. This week, FTX sued to recover money, FTX’s Caroline Ellison began her prison sentence, South Korea arrested hundreds in $232M scam, a guilty plea in a $73M pig-butchering case, BlueNoroff launched a new attack campaign, GodFather malware and WonderFi CEO kidnapped and released after…
-
Malware Campaign Uses Ethereum Smart Contracts to Control npm Typosquat Packages
by
in SecurityNewsAn ongoing campaign is targeting npm developers with hundreds of typosquat versions of their legitimate counterparts in an attempt to trick them into … First seen on thehackernews.com Jump to article: thehackernews.com/2024/11/malware-campaign-uses-ethereum-smart.html
-
Cybercriminals target victims in Spain, Germany, Ukraine with Strela Stealer malware
by
in SecurityNewsFirst seen on therecord.media Jump to article: therecord.media/cybercriminals-taget-spain-germany-ukraine-strela-stealer-malware
-
Iran-linked group aims malware at aerospace industry through fake job recruiters
by
in SecurityNewsFirst seen on therecord.media Jump to article: therecord.media/iran-linked-hackers-aerospace-espionage-malware-fake-recruiters
-
Malware Spotlight: A Deep-Dive Analysis of WezRat
by
in SecurityNewsey Findings: Introduction On October 30th, the FBI, the US Department of Treasury, and the Israeli National Cybersecurity Directorate (INCD) released a jointCybersecurity Advisoryregarding recent activities of the Iranian cyber group Emennet Pasargad.The group recently operated under the name Aria Sepehr Ayandehsazan (ASA) and is affiliated with the Iranian Islamic Revolutionary Guard Corps (IRGC). The…
-
Hamas Hackers Spy on Mideast Gov’ts, Disrupt Israel
by
in SecurityNewsAPT Wirte is doing double duty, adding all manner of supplemental malware to gain access, eavesdrop, and wipe data, depending on the target. First seen on darkreading.com Jump to article: www.darkreading.com/threat-intelligence/hamas-hackers-spy-mideast-govts-disrupt-israel
-
Gefährliche Weiterentwicklung der APT36-Malware <>
by
in SecurityNewsCheck Point Research (CPR), die Threat-Intelligence-Abteilung von Check Point Software Technologies, hat in einem neuen Bericht die technischen und st… First seen on netzpalaver.de Jump to article: netzpalaver.de/2024/11/06/gefaehrliche-weiterentwicklung-der-apt36-malware-elizarat/
-
Google Unveils New Intelligent, Real-Time Protections for Android Users
by
in SecurityNewsGoogle has once again raised the bar for mobile security by introducing two new AI-powered real-time protection features for Android users. With a strong commitment to user privacy and safety, these innovative tools aim to shield users from scams, fraud, malware, and dangerous apps, all while ensuring that users remain in control of their data.…
-
New RustyAttr Malware Targets macOS Through Extended Attribute Abuse
by
in SecurityNewsThreat actors have been found leveraging a new technique that abuses extended attributes for macOS files to smuggle a new malware called RustyAttr.The Singaporean cybersecurity company has attributed the novel activity with moderate confidence to the infamous North Korea-linked Lazarus Group, citing infrastructure and tactical overlaps observed in connection with prior campaigns, including First seen…
-
Erkennung entgehen durch angeflanschtes ZIP
by
in SecurityNews
Tags: malwareIT-Forscher haben Malware entdeckt, die der Erkennung durch Virenscanner durch Verkettung von ZIP-Dateien entgeht. First seen on heise.de Jump to article: www.heise.de/news/Malware-Erkennung-entgehen-durch-angeflanschtes-ZIP-10034752.html
-
APT-Akteure betten Malware in macOS-Flutter-Anwendungen ein
by
in SecurityNewsFlutter ist ein App-Entwickler-Kit von Google für einheitliche, plattformübergreifende Anwendungen. Apps, die mit Flutter erstellt wurden, verfügen über ein App-Layout, das den Code weitgehend verschleiert. Zudem erschwert die Komplexität der Flutter-Architektur die Analyse und Erkennung von Malware erhe First seen on infopoint-security.de Jump to article: www.infopoint-security.de/apt-akteure-betten-malware-in-macos-flutter-anwendungen-ein/a38950/