What's new arround internet

Last one

Src Date (GMT) Titre Description Tags Stories Notes
The_Hackers_News.webp 2020-04-30 05:14:47 New Android Malware Steals Banking Passwords, Private Data and Keystrokes (lien direct) A new type of mobile banking malware has been discovered abusing Android's accessibility features to exfiltrate sensitive data from financial applications, read user SMS messages, and hijack SMS-based two-factor authentication codes. Called "EventBot" by Cybereason researchers, the malware is capable of targeting over 200 different financial apps, including banking, money transfer services, Malware
The_Hackers_News.webp 2020-04-24 03:38:56 Malicious USB Drives Infect 35,000 Computers With Crypto-Mining Botnet (lien direct) Cybersecurity researchers from ESET on Thursday said they took down a portion of a malware botnet comprising at least 35,000 compromised Windows systems that attackers were secretly using to mine Monero cryptocurrency. The botnet, named "VictoryGate," has been active since May 2019, with infections mainly reported in Latin America, particularly Peru accounting for 90% of the compromised Malware
The_Hackers_News.webp 2020-04-20 03:58:02 COVID-Themed Lures Target SCADA Sectors With Data Stealing Malware (lien direct) A new malware campaign has been found using coronavirus-themed lures to strike government and energy sectors in Azerbaijan with remote access trojans (RAT) capable of exfiltrating sensitive documents, keystrokes, passwords, and even images from the webcam. The targeted attacks employ Microsoft Word documents as droppers to deploy a previously unknown Python-based RAT dubbed "PoetRAT" due to Malware
The_Hackers_News.webp 2020-04-08 03:55:51 Dark Nexus: A New Emerging IoT Botnet Malware Spotted in the Wild (lien direct) Cybersecurity researchers have discovered a new emerging IoT botnet threat that leverages compromised smart devices to stage 'distributed denial-of-service' attacks, potentially triggered on-demand through platforms offering DDoS-for-hire services. The botnet, named "dark_nexus" by Bitdefender researchers, works by employing credential stuffing attacks against a variety of devices, such as Malware Threat
The_Hackers_News.webp 2020-04-07 06:48:57 Unveiled: How xHelper Android Malware Re-Installs Even After Factory Reset (lien direct) Remember xHelper? A mysterious piece of Android malware that re-installs itself on infected devices even after users delete it or factory reset their devices-making it nearly impossible to remove. xHelper reportedly infected over 45,000 devices last year, and since then, cybersecurity researchers have been trying to unfold how the malware survives factory reset and how it infected so many Malware
The_Hackers_News.webp 2020-03-30 03:33:19 COVID-19: Hackers Begin Exploiting Zoom\'s Overnight Success to Spread Malware (lien direct) As people increasingly work from home and online communication platforms such as Zoom explode in popularity in the wake of coronavirus outbreak, cybercriminals are taking advantage of the spike in usage by registering new fake "Zoom" domains and malicious "Zoom" executable files in an attempt to trick people into downloading malware on their devices. According to a report published by Check Malware
The_Hackers_News.webp 2020-03-26 02:52:22 Watch Out: Android Apps in Google Play Store Capitalizing on Coronavirus Outbreak (lien direct) Preying on public fears, the ongoing coronavirus outbreak is proving to be a goldmine of opportunity for attackers to stage a variety of malware attacks, phishing campaigns, and create scam sites and malicious tracker apps. Now in a fresh twist, third-party Android app developers too have begun to take advantage of the situation to use coronavirus-related keywords in their app names, Malware
The_Hackers_News.webp 2020-03-25 08:53:40 TrickBot Mobile App Bypasses 2‐Factor Authentication for Net Banking Services (lien direct) The malware authors behind TrickBot banking Trojan have developed a new Android app that can intercept one-time authorization codes sent to Internet banking customers via SMS or relatively more secure push notifications, and complete fraudulent transactions. The Android app, called "TrickMo" by IBM X-Force researchers, is under active development and has exclusively targeted German users Malware
The_Hackers_News.webp 2020-03-24 03:00:25 Over 50 Android Apps for Kids on Google Play Store Caught in Ad Fraud Scheme (lien direct) More than 50 Android apps on the Google Play Store-most of which were designed for kids and had racked up almost 1 million downloads between them-have been caught using a new trick to secretly click on ads without the knowledge of smartphone users. Dubbed "Tekya," the malware in the apps imitated users' actions to click ads from advertising networks such as Google's AdMob, AppLovin', Malware
The_Hackers_News.webp 2020-03-21 00:57:30 Mukashi: A New Mirai IoT Botnet Variant Targeting Zyxel NAS Devices (lien direct) A new version of the infamous Mirai botnet is exploiting a recently uncovered critical vulnerability in network-attached storage (NAS) devices in an attempt to remotely infect and control vulnerable machines. Called "Mukashi," the new variant of the malware employs brute-force attacks using different combinations of default credentials to log into Zyxel NAS, UTM, ATP, and VPN firewall Malware Vulnerability
The_Hackers_News.webp 2020-03-18 03:38:50 Hackers Created Thousands of Coronavirus (COVID-19) Related Sites As Bait (lien direct) As the world comes to grips with the coronavirus pandemic, the situation has proven to be a blessing in disguise for threat actors, who've taken advantage of the opportunity to target victims with scams or malware campaigns. Now, according to a new report published by Check Point Research today and shared with The Hacker News, hackers are exploiting the COVID-19 outbreak to spread their own Malware Threat
The_Hackers_News.webp 2020-03-17 03:37:42 Researchers Uncover a Nigerian Hacker\'s Pursuit of his Million Dollar Dream (lien direct) Social engineering-driven malware threats continue to be a big threat, but new research details how cybercriminals profit off such schemes to launder hundreds of thousands of dollars from stolen credit cards of unsuspecting victims. Cybersecurity firm Check Point Research, in a report published today and shared with The Hacker news, uncovered the digital trail of a Nigerian cybercriminal, who Malware
The_Hackers_News.webp 2020-03-13 01:52:36 New Android Cookie-Stealing Malware Found Hijacking Facebook Accounts (lien direct) A new simple but dangerous strain of Android malware has been found in the wild that steals users' authentication cookies from the web browsing and other apps, including Chrome and Facebook, installed on the compromised devices. Dubbed "Cookiethief" by Kaspersky researchers, the Trojan works by acquiring superuser root rights on the target device, and subsequently, transfer stolen cookies to Malware
The_Hackers_News.webp 2020-03-11 09:57:10 Beware of \'Coronavirus Maps\' – It\'s a malware infecting PCs to steal passwords (lien direct) Cybercriminals will stop at nothing to exploit every chance to prey on internet users. Even the disastrous spread of SARS-COV-II (the virus), which causes COVID-19 (the disease), is becoming an opportunity for them to likewise spread malware or launch cyber attacks. Reason Cybersecurity recently released a threat analysis report detailing a new attack that takes advantage of internet users' Malware Threat
The_Hackers_News.webp 2020-03-11 01:00:26 L1ght Looks to Protect Internet Users from Toxic and Predatory Behavior (lien direct) Cybersecurity has been regarded as a necessity for all computer users, especially today when data breaches and malware attacks have become rampant. However, one of the more overlooked aspects of cybersecurity is the prevention of other forms of cybercrime, such as the spread of harmful content and predatory behavior. Most current discussions on cybersecurity revolve around organizations Malware ★★★
The_Hackers_News.webp 2020-02-25 04:08:15 Free Download: The Ultimate Security Pros\' Checklist (lien direct) You are a cybersecurity professional with the responsibility to keep your organization secured, you know your job chapter and verse, from high level reporting duties to the bits and bytes of what malware targeted your endpoints a week ago. But it's a lot to hold in one's mind, so to make your life easier, The Ultimate Security Pros' Checklist, created by Cynet, provides you with a concise and Malware
The_Hackers_News.webp 2020-02-12 04:47:20 Emotet Malware Now Hacks Nearby Wi-Fi Networks to Infect New Victims (lien direct) Emotet, the notorious trojan behind a number of botnet-driven spam campaigns and ransomware attacks, has found a new attack vector: using already infected devices to identify new victims that are connected to nearby Wi-Fi networks. According to researchers at Binary Defense, the newly discovered Emotet sample leverages a "Wi-Fi spreader" module to scan Wi-Fi networks, and then attempts to Ransomware Spam Malware
The_Hackers_News.webp 2020-01-02 12:13:32 Landry\'s Restaurant Chain Suffers Payment Card Theft Via PoS Malware (lien direct) Landry's, a popular restaurant chain in the United States, has announced a malware attack on its point of sale (POS) systems that allowed cybercriminals to steal customers' payment card information. Landry's owns and operates more than 600 bars, restaurants, hotels, casinos, food and beverage outlets with over 60 different brands such as Landry's Seafood, Chart House, Saltgrass Steak House, Malware
The_Hackers_News.webp 2019-12-21 05:56:48 Hackers Behind GozNym Malware Sentenced for Stealing $100 Million (lien direct) Three members of an international organized cybercrime group that was behind a multi-million dollar theft primarily against U.S. businesses and financial institutions have been sentenced to prison, the U.S. Justice Department announced. The criminals used the GozNym banking Trojan to break into more than 4,000 victim computers globally, primarily in the United States and Europe, between 2015 Malware
The_Hackers_News.webp 2019-12-18 05:34:27 14 Ways to Evade Botnet Malware Attacks On Your Computers (lien direct) Cybercriminals are busy innovators, adapting their weapons and attack strategies, and ruthlessly roaming the web in search of their next big score. Every manner of sensitive information, such as confidential employee records, customers' financial data, protected medical documents, and government files, are all subject to their relentless threats to cybersecurity. Solutions span a broad Malware
The_Hackers_News.webp 2019-12-05 11:16:51 FBI Puts $5 Million Bounty On Russian Hackers Behind Dridex Banking Malware (lien direct) The United States Department of Justice today disclosed the identities of two Russian hackers and charged them for developing and distributing the Dridex banking Trojan using which the duo stole more than $100 million over a period of 10 years. Maksim Yakubets, the leader of 'Evil Corp' hacking group, and his co-conspirator Igor Turashev primarily distributed Dridex - also known as 'Bugat' Malware Guideline
The_Hackers_News.webp 2019-12-05 01:07:48 ZeroCleare: New Iranian Data Wiper Malware Targeting Energy Sector (lien direct) Cybersecurity researchers have uncovered a new, previously undiscovered destructive data-wiping malware that is being used by state-sponsored hackers in the wild to target energy and industrial organizations in the Middle East. Dubbed ZeroCleare, the data wiper malware has been linked to not one but two Iranian state-sponsored hacking groups-APT34, also known as ITG13 and Oilrig, and Hive0081, Malware APT 34
The_Hackers_News.webp 2019-11-22 00:06:46 Russian Hacker Behind NeverQuest Banking Malware Gets 4 Years in U.S. Prison (lien direct) A Russian hacker who created and used Neverquest banking malware to steal money from victims' bank accounts has finally been sentenced to 4 years in prison by the United States District Court for the Southern District of New York. Stanislav Vitaliyevich Lisov, 34, was arrested by Spanish authorities at Barcelona–El Prat Airport in January 2017 on the request of the FBI and extradited to the Malware
The_Hackers_News.webp 2019-11-20 00:58:38 Official Monero Site Hacked to Distribute Cryptocurrency Stealing Malware (lien direct) What an irony - someone hacked the official website of the Monero cryptocurrency project and quietly replaced legitimate Linux and Windows binaries available for download with malicious versions designed to steal funds from users' wallets. The latest supply-chain cyberattack was revealed on Monday after a Monero user spotted that the cryptographic hash for binaries he downloaded from the Malware
The_Hackers_News.webp 2019-11-14 06:01:49 Hackers Impersonating Financial Agencies Target German, Italian, US Firms (lien direct) Security researchers have tracked down activities of a new group of financially-motivated hackers that are targeting several businesses and organizations in Germany, Italy, and the United States in an attempt to infect them with backdoor, banking Trojan, or ransomware malware. Though the new malware campaigns are not customized for each organization, the threat actors appear to be more Ransomware Malware Threat
The_Hackers_News.webp 2019-10-31 07:26:14 Chinese Hackers Compromise Telecom Servers to Spy on SMS Messages (lien direct) A group of Chinese hackers carrying out political espionage for Beijing has been found targeting telecommunications companies with a new piece of malware designed to spy on text messages sent or received by highly targeted individuals. Dubbed "MessageTap," the backdoor malware is a 64-bit ELF data miner that has recently been discovered installed on a Linux-based Short Message Service Center Malware
The_Hackers_News.webp 2019-10-30 12:48:59 Hackers Target Indian Nuclear Power Plant – Everything We Know So Far (lien direct) A story has been making the rounds on the Internet since yesterday about a cyber attack on an Indian nuclear power plant. Due to some experts commentary on social media even after lack of information about the event and overreactions by many, the incident received factually incorrect coverage widely suggesting a piece of malware has compromised "mission-critical systems" at the Kudankulam Malware
The_Hackers_News.webp 2019-10-29 10:55:32 Mysterious malware that re-installs itself infected over 45,000 Android Phones (lien direct) Over the past few months, hundreds of Android users have been complaining online of a new piece of mysterious malware that hides on the infected devices and can reportedly reinstall itself even after users delete it, or factory reset their devices. Dubbed Xhelper, the malware has already infected more than 45,000 Android devices in just the last six months and is continuing to spread by Malware
The_Hackers_News.webp 2019-10-22 04:50:06 Stealthy Microsoft SQL Server Backdoor Malware Spotted in the Wild (lien direct) Cybersecurity researchers claim to have discovered a previously undocumented backdoor specifically designed for Microsoft SQL servers that could allow a remote attacker to control an already compromised system stealthily. Dubbed Skip-2.0, the backdoor malware is a post-exploitation tool that runs in the memory and lets remote attackers connect to any account on the server running MSSQL version Malware Tool
The_Hackers_News.webp 2019-10-16 06:23:03 Phorpiex Botnet Sending Out Millions of Sextortion Emails Using Hacked Computers (lien direct) A decade-old botnet malware that currently controls over 450,000 computers worldwide has recently shifted its operations from infecting machines with ransomware or crypto miners to abusing them for sending out sextortion emails to millions of innocent people. Extortion by email is growing significantly, with a large number of users recently complaining about receiving sextortion emails that Ransomware Malware
The_Hackers_News.webp 2019-10-02 01:53:26 How SMBs Can Mitigate the Growing Risk of File-based Attacks (lien direct) Cases of document-based malware are steadily rising. 59 percent of all malicious files detected in the first quarter of 2019 were contained in documents. Due to how work is done in today's offices and workplaces, companies are among those commonly affected by file-based attacks. Since small to medium businesses (SMBs) usually lack the kind of security that protects their larger counterparts, Malware
The_Hackers_News.webp 2019-09-27 05:29:32 Microsoft Warns of a New Rare Fileless Malware Hijacking Windows Computers (lien direct) Watch out Windows users! There's a new strain of malware making rounds on the Internet that has already infected thousands of computers worldwide and most likely, your antivirus program would not be able to detect it. Why? That's because, first, it's an advanced fileless malware and second, it leverages only legitimate built-in system utilities and third-party tools to extend its Malware
The_Hackers_News.webp 2019-09-26 12:21:53 Outlook for Web Bans 38 More File Extensions in Email Attachments (lien direct) Malware or computer virus can infect your computer in several different ways, but one of the most common methods of its delivery is through malicious file attachments over emails that execute the malware when you open them. Therefore, to protect its users from malicious scripts and executable, Microsoft is planning to blacklist 38 additional file extensions by adding them to its list of file Malware
The_Hackers_News.webp 2019-09-24 06:03:15 Russian APT Map Reveals 22,000 Connections Between 2000 Malware Samples (lien direct) Though Russia still has an undiversified and stagnant economy, it was one of the early countries in the world to realize the value of remotely conducted cyber intrusions. In recent years, many Russia hacking groups have emerged as one of the most sophisticated nation-state actors in cyberspace, producing highly specialized hacking techniques and toolkits for cyber espionage. Over the past Malware
The_Hackers_News.webp 2019-09-24 03:41:23 Cynet 360: The Next Generation of EDR (lien direct) Many organizations regard Endpoint Detection and Response (EDR) as their main protection against breaches. EDR, as a category, emerged in 2012 and was rapidly acknowledged as the best answer to the numerous threats that legacy AV unsuccessfully struggled to overcome – exploits, zero-day malware and fileless attacks are prominent examples. While there is no dispute on EDR's efficiency against a Malware
The_Hackers_News.webp 2019-09-11 10:03:18 (Déjà vu) The Hottest Malware Hits of the Summer (lien direct) It's been a summer of ransomware hold-ups, supply chain attacks and fileless attacks flying under the radar of old-school security. With malware running amok while we were lying on the beach, here's a recap of the most burning strains and trends seen in the wild during the months of July and August 2019. Malware Evolution Trends The heat must have had an effect as this summer saw malware Ransomware Malware
The_Hackers_News.webp 2019-09-11 06:09:04 NetCAT: New Attack Lets Hackers Remotely Steal Data From Intel CPUs (lien direct) Unlike previous side-channel vulnerabilities disclosed in Intel CPUs, researchers have discovered a new flaw that can be exploited remotely over the network without requiring an attacker to have physical access or any malware installed on a targeted computer. Dubbed NetCAT, short for Network Cache ATtack, the new network-based side-channel vulnerability could allow a remote attacker to sniff Malware Vulnerability
The_Hackers_News.webp 2019-09-09 06:18:04 New Malware Uses Windows BITS Service to Stealthy Exfiltrate Data (lien direct) Cybersecurity researchers have discovered a new computer virus associated with the Stealth Falcon state-sponsored cyber espionage group that abuses a built-in component of the Microsoft Windows operating system to stealthily exfiltrate stolen data to attacker-controlled server. Active since 2012, Stealth Falcon is a sophisticated hacking group known for targeting journalists, activists, and Malware
The_Hackers_News.webp 2019-09-06 06:02:01 A Summer of Discontent: The Hottest Malware Hits (lien direct) It's been a summer of ransomware hold-ups, supply chain attacks and fileless attacks flying under the radar of old-school security. With malware running amok while we were lying on the beach, here's a recap of the most burning strains and trends seen in the wild during the months of July and August 2019. Malware Evolution Trends The heat must have had an effect as this summer saw malware Ransomware Malware
The_Hackers_News.webp 2019-08-29 11:38:00 Google Will Now Pay Anyone Who Reports Apps Abusing Users\' Data (lien direct) In the wake of data abuse scandals and several instances of malware app being discovered on the Play Store, Google today expanded its bug bounty program to beef up the security of Android apps and Chrome extensions distributed through its platform. The expansion in Google's vulnerability reward program majorly includes two main announcements. First, a new program, dubbed 'Developer Data Malware Vulnerability
The_Hackers_News.webp 2019-08-28 03:17:05 French Police Remotely Removed RETADUP Malware from 850,000 Infected PCs (lien direct) The French law enforcement agency, National Gendarmerie, today announced the successful takedown of one of the largest wide-spread RETADUP botnet malware and how it remotely disinfected more than 850,000 computers worldwide with the help of researchers. Earlier this year, security researchers at Avast antivirus firm, who were actively monitoring the activities of RETADUP botnet, discovered a Malware
The_Hackers_News.webp 2019-08-13 05:19:00 Cerberus: A New Android \'Banking Malware For Rent\' Emerges (lien direct) After a few popular Android Trojans like Anubis, Red Alert 2.0, GM bot, and Exobot, quit their malware-as-a-service businesses, a new player has emerged on the Internet with similar capabilities to fill the gap, offering Android bot rental service to the masses. Dubbed "Cerberus," the new remote access Trojan allows remote attackers to take total control over the infected Android devices and Malware
The_Hackers_News.webp 2019-08-06 11:01:00 Pakistani Man Bribed AT&T Insiders to Plant Malware and Unlock 2 Million Phones (lien direct) United States federal government has charged a Pakistani national for bribing employees at AT&T telecommunication company over a period of five years to help unlock more than 2 million phones and plant malware on the company's network. Muhammad Fahd, a 34-year-old man from Pakistan, was arrested in Hong Kong last year in February at the request of the U.S. government and just extradited to the Malware
The_Hackers_News.webp 2019-07-26 07:31:01 Just Opening A Document in LibreOffice Can Hack Your Computer (Unpatched) (lien direct) Are you using LibreOffice? You should be extra careful about what document files you open using the LibreOffice software over the next few days. That's because LibreOffice contains a severe unpatched code execution vulnerability that could sneak malware into your system as soon as you open a maliciously-crafted document file. LibreOffice is one of the most popular and open source Malware Hack Vulnerability
The_Hackers_News.webp 2019-07-25 06:45:04 Popular Malware Families Using \'Process Doppelgänging\' to Evade Detection (lien direct) The fileless code injection technique called Process Doppelgänging is actively being used by not just one or two but a large number of malware families in the wild, a new report shared with The Hacker News revealed. Discovered in late 2017, Process Doppelgänging is a fileless variation of Process Injection technique that takes advantage of a built-in Windows function to evade detection and Malware
The_Hackers_News.webp 2019-07-25 02:38:03 Linux Botnet Adding BlueKeep-Flawed Windows RDP Servers to Its Target List (lien direct) Cybersecurity researchers have discovered a new variant of WatchBog, a Linux-based cryptocurrency mining malware botnet, which now also includes a module to scan the Internet for Windows RDP servers vulnerable to the Bluekeep flaw. BlueKeep is a highly-critical, wormable, remote code execution vulnerability in the Windows Remote Desktop Services that could allow an unauthenticated remote Malware Vulnerability
The_Hackers_News.webp 2019-07-25 00:16:01 New Android Spyware Created by Russian Defense Contractor Found in the Wild (lien direct) Cybersecurity researchers have uncovered a new piece of mobile surveillance malware believed to be developed by a Russian defense contractor that has been sanctioned for interfering with the 2016 U.S. presidential election. Dubbed Monokle, the mobile remote-access trojan has been actively targeting Android phones since at least March 2016 and is primarily being used in highly targeted attacks on Malware
The_Hackers_News.webp 2019-07-17 07:32:05 EvilGnome: A New Backdoor Implant Spies On Linux Desktop Users (lien direct) Security researchers have discovered a rare piece of Linux spyware that's currently fully undetected across all major antivirus security software products, and includes rarely seen functionalities with regards to most Linux malware, The Hacker News learned. It's a known fact that there are a very few strains of Linux malware exist in the wild as compared to Windows viruses because of its core Malware
The_Hackers_News.webp 2019-07-11 06:04:00 New Malware Replaced Legit Android Apps With Fake Ones On 25 Million Devices (lien direct) Are you sure the WhatsApp app you are using on your Android device is legitimate, even if it's working perfectly as intended? ...Or the JioTV, AppLock, HotStar, Flipkart, Opera Mini or Truecaller app-if you have installed any of these? I'm asking this because cybersecurity researchers just yesterday revealed eye-opening details about a widespread Android malware campaign wherein attackers Malware
The_Hackers_News.webp 2019-07-10 23:57:04 Magecart Hackers Infect 17,000 Sites Through Misconfigured Amazon S3 Buckets (lien direct) Magecart strikes again! Cybersecurity researchers have identified yet another supply-chain attack carried out by payment card hackers against more than 17,000 web domains, which also include websites in the top 2,000 of Alexa rankings. Since Magecart is neither a single group nor a specific malware instead an umbrella term given to all those cyber criminal groups and individuals who inject Malware
Last update at: 2024-08-01 03:18:51
See our sources.
My email:

To see everything: Our RSS (filtrered) Twitter