What's new arround internet

Last one

Src Date (GMT) Titre Description Tags Stories Notes
The_Hackers_News.webp 2022-02-28 02:01:25 Experts Create Apple AirTag Clone That Can Bypass Anti-Tracking Measures (lien direct) Cybersecurity researchers have managed to build a clone of Apple Airtag that circumvents the anti-stalking protection technology built into its Find My Bluetooth-based tracking protocol. The result is a stealth AirTag that can successfully track an iPhone user for over five days without triggering a tracking notification, Positive Security's co-founder Fabian Bräunlein said in a deep-dive
The_Hackers_News.webp 2022-02-27 22:52:31 Iranian Hackers Using New Spying Malware That Abuses Telegram Messenger API (lien direct) An Iranian geopolitical nexus threat actor has been uncovered deploying two new targeted malware that come with "simple" backdoor functionalities as part of an intrusion against an unnamed Middle East government entity in November 2021. Cybersecurity company Mandiant attributed the attack to an uncategorized cluster it's tracking under the moniker UNC3313, which it assesses with "moderate Malware Threat
The_Hackers_News.webp 2022-02-26 02:19:53 Social Media Hijacking Malware Spreading Through Gaming Apps on Microsoft Store (lien direct) A new malware capable of controlling social media accounts is being distributed through Microsoft's official app store in the form of trojanized gaming apps, infecting more than 5,000 Windows machines in Sweden, Bulgaria, Russia, Bermuda, and Spain. Israeli cybersecurity company Check Point dubbed the malware "Electron Bot," in reference to a command-and-control (C2) domain used in recent Malware
The_Hackers_News.webp 2022-02-25 23:39:31 Russia-Ukraine War: Phishing, Malware and Hacker Groups Taking Sides (lien direct) Ukraine's Computer Emergency Response Team (CERT-UA) has warned of Belarusian state-sponsored hackers targeting its military personnel and related individuals as part of a phishing campaign mounted amidst Russia's military invasion of the country. "Mass phishing emails have recently been observed targeting private 'i.ua' and 'meta.ua' accounts of Ukrainian military personnel and related Malware
The_Hackers_News.webp 2022-02-25 09:21:07 New "SockDetour" Fileless, Socketless Backdoor Targets U.S. Defense Contractors (lien direct) Cybersecurity researchers have taken the wraps off a previously undocumented and stealthy custom malware called SockDetour that targeted U.S.-based defense contractors with the goal of being used as a secondary implant on compromised Windows hosts. "SockDetour is a backdoor that is designed to remain stealthily on compromised Windows servers so that it can serve as a backup backdoor in case the Malware
The_Hackers_News.webp 2022-02-25 06:08:03 Iran\'s MuddyWater Hacker Group Using New Malware in Worldwide Cyber Attacks (lien direct) Cybersecurity agencies from the U.K. and the U.S. have laid bare a new malware used by the Iranian government-sponsored advanced persistent threat (APT) group in attacks targeting government and commercial networks worldwide. "MuddyWater actors are positioned both to provide stolen data and accesses to the Iranian government and to share these with other malicious cyber actors," the agencies  Malware Threat
The_Hackers_News.webp 2022-02-25 00:33:47 Putin Warns Russian Critical Infrastructure to Brace for Potential Cyber Attacks (lien direct) The Russian government on Thursday warned of cyber attacks aimed at domestic critical infrastructure operators, as the country's full-blown invasion of Ukraine enters the second day. In addition to cautioning of the "threat of an increase in the intensity of computer attacks," Russia's National Computer Incident Response and Coordination Center said that the "attacks can be aimed at disrupting
The_Hackers_News.webp 2022-02-25 00:03:14 Notorious TrickBot Malware Gang Shuts Down its Botnet Infrastructure (lien direct) The modular Windows crimeware platform known as TrickBot formally shuttered its infrastructure on Thursday after reports emerged of its imminent retirement amid a lull in its activity for almost two months, marking an end to one of the most persistent malware campaigns in recent years. "TrickBot is gone... It is official now as of Thursday, February 24, 2022. See you soon... or not," AdvIntel's Malware
The_Hackers_News.webp 2022-02-24 21:06:48 New Flaws Discovered in Cisco\'s Network Operating System for Switches (lien direct) Cisco has released software updates to address four security vulnerabilities in its software that could be weaponized by malicious actors to take control of affected systems. The most critical of the flaws is CVE-2022-20650 (CVSS score: 8.8), which relates to a command injection flaw in the NX-API feature of Cisco NX-OS Software that stems from a lack of sufficient input validation of
The_Hackers_News.webp 2022-02-24 05:28:40 TrickBot Gang Likely Shifting Operations to Switch to New Malware (lien direct) TrickBot, the infamous Windows crimeware-as-a-service (CaaS) solution that's used by a variety of threat actors to deliver next-stage payloads like ransomware, appears to be undergoing a transition of sorts, with no new activity recorded since the start of the year. The lull in the malware campaigns is "partially due to a big shift from Trickbot's operators, including working with the operators Malware Threat
The_Hackers_News.webp 2022-02-24 05:27:27 From Pet Systems to Cattle Farm - What Happened to the Data Center? (lien direct) There's something about craftsmanship. It's personal, its artistry, and it can be incredibly effective in achieving its goals. On the other hand, mass-market production can be effective in other ways, through speed, efficiency, and cost savings. The story of data centers is one of going from craftsmanship – where every individual machine is a pet project, maintained with great care – to mass
The_Hackers_News.webp 2022-02-24 04:34:53 Warning - Deadbolt Ransomware Targeting ASUSTOR NAS Devices (lien direct) ASUSTOR network-attached storage (NAS) devices have become the latest victim of Deadbolt ransomware, less than a month after similar attacks singled out QNAP NAS appliances. In response to the infections, the company has released firmware updates (ADM 4.0.4.RQO2) to "fix related security issues." The company is also urging users to take the following actions to keep data secure – Ransomware
The_Hackers_News.webp 2022-02-24 04:16:53 CISA Alerts on Actively Exploited Flaws in Zabbix Network Monitoring Platform (lien direct) The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has warned of active exploitation of two security flaws impacting Zabbix open-source enterprise monitoring platform, adding them to its Known Exploited Vulnerabilities Catalog. On top of that, CISA is also recommending that Federal Civilian Executive Branch (FCEB) agencies patch all systems against the vulnerabilities by March 8,
The_Hackers_News.webp 2022-02-24 03:57:49 US, UK Agencies Warn of New Russian Botnet Built from Hacked Firewall Devices (lien direct) Intelligence agencies in the U.K. and the U.S. disclosed details of a new botnet malware called Cyclops Blink that's been attributed to the Russian-backed Sandworm hacking group and deployed in attacks dating back to 2019. "Cyclops Blink appears to be a replacement framework for the VPNFilter malware exposed in 2018, which exploited network devices, primarily small office/home office (SOHO) Malware VPNFilter VPNFilter
The_Hackers_News.webp 2022-02-23 21:28:39 New Wiper Malware Targeting Ukraine Amid Russia\'s Military Operation (lien direct) Cybersecurity firms ESET and Broadcom's Symantec said they discovered a new data wiper malware used in fresh attacks against hundreds of machines in Ukraine, as Russian forces formally launched a full-scale military operation against the country. The Slovak company dubbed the wiper "HermeticWiper" (aka KillDisk.NCV), with one of the malware samples compiled on December 28, 2021, implying that Malware
The_Hackers_News.webp 2022-02-23 05:01:46 Dridex Malware Deploying Entropy Ransomware on Hacked Computers (lien direct) Similarities have been unearthed between the Dridex general-purpose malware and a little-known ransomware strain called Entropy, suggesting that the operators are continuing to rebrand their extortion operations under a different name. "The similarities are in the software packer used to conceal the ransomware code, in the malware subroutines designed to find and obfuscate commands (API calls), Ransomware Malware
The_Hackers_News.webp 2022-02-23 00:39:07 Chinese Experts Uncover Details of Equation Group\'s Bvp47 Covert Hacking Tool (lien direct) Researchers from China's Pangu Lab have disclosed details of a "top-tier" backdoor put to use by the Equation Group, an advanced persistent threat (APT) with alleged ties to the cyber-warfare intelligence-gathering unit of the U.S. National Security Agency (NSA). Dubbed "Bvp47" owing to numerous references to the string "Bvp" and the numerical value "0x47" used in the encryption algorithm, the Tool Threat
The_Hackers_News.webp 2022-02-22 23:06:23 9-Year-Old Unpatched Email Hacking Bug Uncovered in Horde Webmail Software (lien direct) Users of Horde Webmail are being urged to disable a feature to contain a nine-year-old unpatched security vulnerability in the software that could be abused to gain complete access to email accounts simply by previewing an attachment. "This gives the attacker access to all sensitive and perhaps secret information a victim has stored in their email account and could allow them to gain further Vulnerability
The_Hackers_News.webp 2022-02-22 22:30:13 25 Malicious JavaScript Libraries Distributed via Official NPM Package Repository (lien direct) Another batch of 25 malicious JavaScript libraries have made their way to the official NPM package registry with the goal of stealing Discord tokens and environment variables from compromised systems, more than two months after 17 similar packages were taken down. The libraries in question leveraged typosquatting techniques and masqueraded as other legitimate packages such as colors.js,
The_Hackers_News.webp 2022-02-22 06:43:05 Hackers Stole $1.7 Million Worth of NFTs from Users of OpenSea Marketplace (lien direct) Malicious actors took advantage of a smart contract upgrade process in the OpenSea NFT marketplace to carry out a phishing attack against 17 of its users that resulted in the theft of virtual assets worth about $1.7 million. NFTs, short for non-fungible tokens, are digital tokens that act like certificates of authenticity for, and in some cases represent ownership of, assets that range from
The_Hackers_News.webp 2022-02-22 00:11:01 Chinese Hackers Target Taiwan\'s Financial Trading Sector with Supply Chain Attack (lien direct) An advanced persistent threat (APT) group operating with objectives aligned with the Chinese government has been linked to an organized supply chain attack on Taiwan's financial sector. The attacks are said to have first commenced at the end of November 2021, with the intrusions attributed to a threat actor tracked as APT10, also known as Stone Panda, the MenuPass group, and Bronze Riverside, Threat APT 10 APT 10
The_Hackers_News.webp 2022-02-21 23:22:21 Hackers Backdoor Unpatched Microsoft SQL Database Servers with Cobalt Strike (lien direct) Vulnerable internet-facing Microsoft SQL (MS SQL) Servers are being targeted by threat actors as part of a new campaign to deploy the Cobalt Strike adversary simulation tool on compromised hosts. "Attacks that target MS SQL servers include attacks to the environment where its vulnerability has not been patched, brute forcing, and dictionary attack against poorly managed servers," South Korean Tool Vulnerability Threat
The_Hackers_News.webp 2022-02-21 08:04:55 New Android Banking Trojan Spreading via Google Play Store Targets Europeans (lien direct) A new Android banking trojan with over 50,000 installations has been observed distributed via the official Google Play Store with the goal of targeting 56 European banks and carrying out harvesting sensitive information from compromised devices. Dubbed Xenomorph by Dutch security firm ThreatFabric, the in-development malware is said to share overlaps with another banking trojan tracked under the Malware
The_Hackers_News.webp 2022-02-21 06:49:54 Iranian State Broadcaster IRIB Hit by Destructive Wiper Malware (lien direct) An investigation into the cyberattack targeting Iranian national media corporation, Islamic Republic of Iran Broadcasting (IRIB), in late January 2022 resulted in the deployment of a wiper malware and other custom implants, as the country's national infrastructure continues to face a wave of attacks aimed at inflicting serious damage. "This indicates that the attackers' aim was also to disrupt Malware
The_Hackers_News.webp 2022-02-21 05:54:18 A Free Solution to Protect Your Business from 6 Biggest Cyber Threats in 2022 (lien direct) For the last few years, the cybersecurity threat landscape has gotten progressively more complex and dangerous. The online world is now rife with data thieves, extortionists, and even state actors looking to exploit vulnerabilities in businesses' digital defenses.  And unfortunately - the bad guys have the upper hand at the moment. Part of the reason for that is the fallout from the rapid Threat
The_Hackers_News.webp 2022-02-21 00:59:33 Hackers Exploit Bug in SMS Verification Services to Infect Android Devices (lien direct) An analysis of SMS phone-verified account (PVA) services has led to the discovery of a rogue platform built atop a botnet involving thousands of infected Android phones, once again underscoring the flaws with relying on SMS for account validation. SMS PVA services, since gain prevalence in 2018, provide users with alternative mobile numbers that can be used to register for other online services
The_Hackers_News.webp 2022-02-19 22:12:01 Master Key for Hive Ransomware Retrieved Using a Flaw in its Encryption Algorithm (lien direct) Researchers have detailed what they call the "first successful attempt" at decrypting data infected with Hive ransomware without relying on the private key used to lock access to the content. "We were able to recover the master key for generating the file encryption key without the attacker's private key, by using a cryptographic vulnerability identified through analysis," a group of academics Ransomware Vulnerability
The_Hackers_News.webp 2022-02-19 04:30:48 Justice Department Appoints First Director of National Cryptocurrency Enforcement Team (lien direct) The U.S. Department of Justice (DoJ) earlier this week appointed Eun Young Choi to serve as the first Director of the National Cryptocurrency Enforcement Team (NCET) it established last year. The NCET was created to tackle the criminal misuse of cryptocurrencies and digital assets," with a focus on illegal activities in virtual currency exchanges, mixing and tumbling services, and money
The_Hackers_News.webp 2022-02-18 23:36:26 U.S. Cybersecurity Agency Publishes List of Free Security Tools and Services (lien direct) The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday published a repository of free tools and services to enable organizations to mitigate, detect, and respond effectively to malicious attacks and further improve their security posture. The "Free Cybersecurity Services and Tools" resource hub comprises a mix of services provided by CISA, open-source utilities, and other
The_Hackers_News.webp 2022-02-18 22:25:08 Critical Flaw Uncovered in WordPress Backup Plugin Used by Over 3 Million Sites (lien direct) Patches have been issued to contain a "severe" security vulnerability in UpdraftPlus, a WordPress plugin with over three million installations, that can be weaponized to download the site's private data using an account on the vulnerable sites. "All versions of UpdraftPlus from March 2019 onwards have contained a vulnerability caused by a missing permissions-level check, allowing untrusted users Vulnerability ★★
The_Hackers_News.webp 2022-02-18 04:32:20 Microsoft Warns of \'Ice Phishing\' Threat on Web3 and Decentralized Networks (lien direct) Microsoft has warned of emerging threats in the Web3 landscape, including "ice phishing" campaigns, as a surge in adoption of blockchain and DeFi technologies emphasizes the need to build security into the decentralized web while it's still in its early stages. The company's Microsoft 365 Defender Research Team called out various new avenues through which malicious actors may attempt to trick Threat
The_Hackers_News.webp 2022-02-18 03:57:05 PseudoManuscrypt Malware Spreading the Same Way as CryptBot Targets Koreans (lien direct) Numerous Windows machines located in South Korea have been targeted by a botnet tracked as PseudoManuscrypt since at least May 2021 by employing the same delivery tactics of another malware called CryptBot. "PseudoManuscrypt is disguised as an installer that is similar to a form of CryptBot, and is being distributed," South Korean cybersecurity company AhnLab Security Emergency Response Center ( Malware
The_Hackers_News.webp 2022-02-18 00:37:46 New Linux Privilege Escalation Flaw Uncovered in Snap Package Manager (lien direct) Multiple security vulnerabilities have been disclosed in Canonical's Snap software packaging and deployment system, the most critical of which can be exploited to escalate privilege to gain root privileges. Snaps are self-contained application packages that are designed to work on operating systems that use the Linux kernel and can be installed using a tool called snapd. Tracked Tool
The_Hackers_News.webp 2022-02-17 23:40:44 Iranian Hackers Targeting VMware Horizon Log4j Flaws to Deploy Ransomware (lien direct) A "potentially destructive actor" aligned with the government of Iran is actively exploiting the well-known Log4j vulnerability to infect unpatched VMware Horizon servers with ransomware. Cybersecurity firm SentinelOne dubbed the group "TunnelVision" owing to their heavy reliance on tunneling tools, with overlaps in tactics observed to that of a broader group tracked under the moniker Phosphorus Ransomware Conference APT 35
The_Hackers_News.webp 2022-02-17 22:15:27 4 Cloud Data Security Best Practices All Businesses Should Follow Today (lien direct) These days, businesses all around the world have come to depend on cloud platforms for a variety of mission-critical workflows. They keep their CRM data in the cloud. They process their payrolls in the cloud. They even manage their HR processes through the cloud. And all of that means they're trusting the bulk of their privileged business data to those cloud providers, too. And while most major
The_Hackers_News.webp 2022-02-17 21:19:03 Attackers Can Crash Cisco Email Security Appliances by Sending Malicious Emails (lien direct) Cisco has released security updates to contain three vulnerabilities affecting its products, including one high-severity flaw in its Email Security Appliance (ESA) that could result in a denial-of-service (DoS) condition on an affected device. The weakness, assigned the identifier CVE-2022-20653 (CVSS score: 7.5), stems from a case of insufficient error handling in DNS name resolution that could
The_Hackers_News.webp 2022-02-17 19:38:08 Another Critical RCE Discovered in Adobe Commerce and Magento Platforms (lien direct) Adobe on Thursday updated its advisory for an actively exploited zero-day affecting Adobe Commerce and Magento Open Source to patch a newly discovered flaw that could be weaponized to achieve arbitrary code execution. Tracked as CVE-2022-24087, the issue – like CVE-2022-24086 – is rated 9.8 on the CVSS vulnerability scoring system and relates to an "Improper Input Validation" bug Vulnerability
The_Hackers_News.webp 2022-02-17 05:36:12 Getting Your SOC 2 Compliance as a SaaS Company (lien direct) If you haven't heard of the term, you will soon enough. SOC 2, meaning System and Organization Controls 2, is an auditing procedure developed by the American Institute of CPAs (AICPA). Having SOC 2 compliance means you have implemented organizational controls and practices that provide assurance for the safeguarding and security of client data. In other words, you have to show (e.g., document
The_Hackers_News.webp 2022-02-17 05:21:53 Google Bringing Privacy Sandbox to Android to Limit Sharing of User Data (lien direct) Google on Wednesday announced plans to bring its Privacy Sandbox initiatives to Android in a bid to expand its privacy-focused, but also less disruptive, advertising technology beyond the desktop web. To that end, the internet giant said it will work towards building solutions that prevent cross-app tracking à la Apple's App Tracking Transparency (ATT) framework, effectively limiting sharing of
The_Hackers_News.webp 2022-02-17 01:22:21 This New Tool Can Retrieve Pixelated Text from Redacted Documents (lien direct) The practice of blurring out text using a method called pixelation may not be as secure as previously thought. While the most foolproof way of concealing sensitive textual information is to use opaque black bars, other redaction methods like pixelation can achieve the opposite effect, enabling the reversal of pixelized text back into its original form. Dan Petro, a lead researcher at offensive Tool Guideline
The_Hackers_News.webp 2022-02-17 00:16:51 Researchers Warn of a New Golang-based Botnet Under Continuous Development (lien direct) Cybersecurity researchers have unpacked a new Golang-based botnet called Kraken that's under active development and features an array of backdoor capabilities to siphon sensitive information from compromised Windows hosts. "Kraken already features the ability to download and execute secondary payloads, run shell commands, and take screenshots of the victim's system," threat intelligence firm Threat
The_Hackers_News.webp 2022-02-16 23:33:17 Moses Staff Hackers Targeting Israeli Organizations for Cyber Espionage (lien direct) The politically motivated Moses Staff hacker group has been observed using a custom multi-component toolset with the goal of carrying out espionage against its targets as part of a new campaign that exclusively singles out Israeli organizations. First publicly documented in late 2021, Moses Staff is believed to be sponsored by the Iranian government, with attacks reported against entities in
The_Hackers_News.webp 2022-02-16 21:42:59 U.S. Says Russian Hackers Stealing Sensitive Data from Defense Contractors (lien direct) State-sponsored actors backed by the Russian government regularly targeted the networks of several U.S. cleared defense contractors (CDCs) to acquire proprietary documents and other confidential information pertaining to the country's defense and intelligence programs and capabilities. The sustained espionage campaign is said to have commenced at least two years ago from January 2020, according
The_Hackers_News.webp 2022-02-16 07:46:53 [Webinar] When More Is Not Better: Solving Alert Overload (lien direct) The increasing volume and sophistication of cyberattacks have naturally led many companies to invest in additional cybersecurity technologies. We know that expanded threat detection capabilities are necessary for protection, but they have also led to several unintended consequences. The “more is not always better” adage fits this situation perfectly. An upcoming webinar by cybersecurity company Threat
The_Hackers_News.webp 2022-02-16 06:03:58 Trickbot Malware Targeted Customers of 60 High-Profile Companies Since 2020 (lien direct) The notorious TrickBot malware is targeting customers of 60 financial and technology companies, including cryptocurrency firms, primarily located in the U.S., even as its operators have updated the botnet with new anti-analysis features. "TrickBot is a sophisticated and versatile malware with more than 20 modules that can be downloaded and executed on demand," Check Point researchers Aliaksandr Malware
The_Hackers_News.webp 2022-02-16 03:25:59 VMware Issues Security Patches for High-Severity Flaws Affecting Multiple Products (lien direct) VMware on Tuesday patched several high-severity vulnerabilities impacting ESXi, Workstation, Fusion, Cloud Foundation, and NSX Data Center for vSphere that could be exploited to execute arbitrary code and cause a denial-of-service (DoS) condition. As of writing, there's no evidence that any of the weaknesses are exploited in the wild. The list of six flaws is as follows –
The_Hackers_News.webp 2022-02-16 00:55:01 EU Data Protection Watchdog Calls for Ban on Pegasus-like Commercial Spyware (lien direct) The European Union's data protection authority on Tuesday called for a ban on the development and the use of Pegasus-like commercial spyware in the region, calling out the technology's "unprecedented level of intrusiveness" that could endanger users' right to privacy. "Pegasus constitutes a paradigm shift in terms of access to private communications and devices, which is able to affect the very
The_Hackers_News.webp 2022-02-15 21:25:21 High-Severity RCE Security Bug Reported in Apache Cassandra Database Software (lien direct) Researchers have revealed details of a now-patched high-severity security vulnerability in Apache Cassandra that, if left unaddressed, could be abused to gain remote code execution on affected installations. "This Apache security vulnerability is easy to exploit and has the potential to wreak havoc on systems, but luckily only manifests in non-default configurations of Cassandra," Omer Kaspi, Vulnerability
The_Hackers_News.webp 2022-02-15 20:32:12 Facebook Agrees to Pay $90 Million to Settle Decade-Old Privacy Violation Case (lien direct) Meta Platforms has agreed to pay $90 million to settle a lawsuit over the company's use of cookies to allegedly track Facebook users' internet activity even after they had logged off from the platform. In addition, the social media company will be required to delete all of the data it illegally collected from those users. The development was first reported by Variety. The
The_Hackers_News.webp 2022-02-15 06:06:28 Researchers Link ShadowPad Malware Attacks to Chinese Ministry and PLA (lien direct) Cybersecurity researchers have detailed the inner workings of ShadowPad, a sophisticated and modular backdoor that has been adopted by a growing number of Chinese threat groups in recent years, while also linking it to the country's civilian and military intelligence agencies. "ShadowPad is decrypted in memory using a custom decryption algorithm," researchers from Secureworks said in a report Malware Threat ★★★★
Last update at: 2024-07-28 13:23:06
See our sources.
My email:

To see everything: Our RSS (filtrered) Twitter