What's new arround internet

Last one

Src Date (GMT) Titre Description Tags Stories Notes
SecurityAffairs.webp 2022-12-01 22:39:51 New Go-based Redigo malware targets Redis servers (lien direct) >Redigo is a new Go-based malware employed in attacks against Redis servers affected by the CVE-2022-0543 vulnerability. Researchers from security firm AquaSec discovered a new Go-based malware that is used in a campaign targeting Redis servers. Threat actors are exploiting a critical vulnerability, tracked as CVE-2022-0543, in Redis (Remote Dictionary Server) servers. Redis (remote dictionary server) […] Malware Threat ★★★
SecurityAffairs.webp 2022-11-24 09:59:26 An aggressive malware campaign targets US-based companies with Qakbot to deliver Black Basta Ransomware (lien direct) >Researchers warn of an ongoing aggressive Qakbot malware campaign that leads to Black Basta ransomware infections in the US. Experts at the Cybereason Global SOC (GSOC) team have observed a surge in Qakbot infections as part of an ongoing aggressive Qakbot malware campaign that leads to Black Basta ransomware infections in the US. In the last two […] Ransomware Malware Guideline
SecurityAffairs.webp 2022-11-23 18:53:23 Ducktail information stealer continues to evolve (lien direct) >The operators behind the Ducktail information stealer continue to improve their malicious code, operators experts warn. In late July 2022, researchers from WithSecure (formerly F-Secure Business) discovered an ongoing operation, named DUCKTAIL, that was targeting individuals and organizations that operate on Facebook's Business and Ads platform. Experts attribute the campaign to a Vietnamese financially motivated […] Malware ★★
SecurityAffairs.webp 2022-11-22 19:04:22 Researcher warns that Cisco Secure Email Gateways can easily be circumvented (lien direct) >A researcher revealed how to bypass some of the filters in Cisco Secure Email Gateway appliance and deliver malware using specially crafted emails. An anonymous researcher publicly disclosed a series of techniques to bypass some of the filters in Cisco Secure Email Gateway appliance and deliver malware using specially crafted emails. The researcher pointed out […] Malware ★★★
SecurityAffairs.webp 2022-11-22 15:20:06 Aurora Stealer Malware is becoming a prominent threat in the cybercrime ecosystem (lien direct) >Researchers warn of threat actors employing a new Go-based malware dubbed Aurora Stealer in attacks in the wild. Aurora Stealer is an info-stealing malware that was first advertised on Russian-speaking underground forums in April 2022. Aurora was offered as Malware-as-a-Service (MaaS) by a threat actor known as Cheshire. It is a multi-purpose botnet with data stealing […] Malware Threat ★★★★
SecurityAffairs.webp 2022-11-22 08:39:56 Emotet is back and delivers payloads like IcedID and Bumblebee (lien direct) >The Emotet malware is back and experts warn of a high-volume malspam campaign delivering payloads like IcedID and Bumblebee. Proofpoint researchers warn of the return of the Emotet malware, in early November the experts observed a high-volume malspam campaign delivering payloads like IcedID and Bumblebee. The Emotet banking trojan has been active at least since 2014, the botnet is […] Malware ★★★
SecurityAffairs.webp 2022-11-19 09:22:01 New improved versions of LodaRAT spotted in the wild (lien direct) >Cisco Talos spotted multiple updated versions of LodaRAT that were deployed alongside other malware families, including RedLine and Neshta. Researchers from Cisco Talos have monitored the LodaRAT malware over the course of 2022 and recently discovered multiple updated versions that have been deployed alongside other malware families, including RedLine and Neshta. The versions include new […] Malware
SecurityAffairs.webp 2022-11-18 08:24:14 Ongoing supply chain attack targets Python developers with WASP Stealer (lien direct) >A threat actor tracked as WASP is behind an ongoing supply chain attack targeting Python developers with the WASP Stealer. Checkmarx researchers uncovered an ongoing supply chain attack conducted by a threat actor they tracked as WASP that is targeting Python developers. The attackers are using Python packages to distribute a polymorphic malware called W4SP […] Malware Threat
SecurityAffairs.webp 2022-11-16 11:39:15 New RapperBot Campaign targets game servers with DDoS attacks (lien direct) >Fortinet researchers discovered new samples of RapperBot used to build a botnet to launch Distributed DDoS attacks against game servers. Fortinet FortiGuard Labs researchers have discovered new samples of the RapperBot malware that are being used to build a DDoS botnet to target game servers. Researchers from FortiGuard Labs discovered the previously undetected RapperBot IoT […] Malware
SecurityAffairs.webp 2022-11-14 12:52:52 KmsdBot, a new evasive bot for cryptomining activity and DDoS attacks (lien direct) >Researchers spotted a new evasive malware, tracked as KmsdBot, that infects systems via an SSH connection that uses weak credentials. Akamai Security Research discovered a new evasive Golang-based malware, tracked as KmsdBot, that infects systems via an SSH connection that uses weak login credentials. The malware was employed in cryptocurrency mining campaigns and to launch […] Malware
SecurityAffairs.webp 2022-11-12 14:53:58 Malicious app in the Play Store spotted distributing Xenomorph Banking Trojan (lien direct) Experts discovered two new malicious dropper apps on the Google Play Store distributing the Xenomorph banking malware. Zscaler ThreatLabz researchers discovered a couple of malicious dropper apps on the Play Store distributing the Xenomorph banking malware. Xenomorph was first spotted by ThreatFabric researchers in February 2022, at the time the malware was employed in attacks […] Malware
SecurityAffairs.webp 2022-11-11 21:07:03 Long-running surveillance campaigns target Uyghurs with BadBazaar and MOONSHINE spyware (lien direct) >Lookout researchers discovered two long-running surveillance campaigns targeting the ethnic minority Uyghurs. Researchers from mobile security firm Lookout uncovered two long-running surveillance campaigns targeting the Uyghurs minority. The threat actors behind the campaigns used two Android spyware to spy on the victims and steal sensitive information. The campaigns involved a new piece of malware called […] Malware Threat
SecurityAffairs.webp 2022-11-10 16:15:55 Researchers warn of malicious packages on PyPI using steganography (lien direct) >Experts discovered a malicious package on the Python Package Index (PyPI) that uses steganographic to hide malware within image files. CheckPoint researchers discovered a malicious package, named ‘apicolor,’ on the Python Package Index (PyPI) that uses steganographic to hide malware within image files. The malicious package infects PyPI users through open-source projects on Github.  The […] Malware
SecurityAffairs.webp 2022-11-09 13:31:43 Experts observed Amadey malware deploying LockBit 3.0 Ransomware (lien direct) >Experts noticed that the Amadey malware is being used to deploy LockBit 3.0 ransomware on compromised systems. Researchers from AhnLab Security Emergency Response Center (ASEC) reported that the Amadey malware is being used to deploy LockBit 3.0 ransomware on compromised systems, researchers have warned. Amadey Bot is a data-stealing malware that was first spotted in 2018, it also allows […] Ransomware Malware
SecurityAffairs.webp 2022-11-08 18:22:33 SmokeLoader campaign distributes new Laplas Clipper malware (lien direct) >Researchers observed a SmokeLoader campaign that is distributing a new clipper malware dubbed Laplas Clipper that targets cryptocurrency users. Cyble researchers uncovered a SmokeLoader campaign that is distributing community malware, such as SystemBC and Raccoon Stealer 2.0, along with a new clipper malware tracked as Laplas. The experts detected more than 180 different samples of the clipper […] Malware
SecurityAffairs.webp 2022-11-05 21:34:11 29 malicious PyPI packages spotted delivering the W4SP Stealer (lien direct) >Cybersecurity researchers discovered 29 malicious PyPI packages delivering the W4SP stealer to developers’ systems. Cybersecurity researchers have discovered 29 packages in the official Python Package Index (PyPI) repository designed to infect developers’ systems with an info-stealing malware dubbed W4SP Stealer. “It appears that these packages are a more sophisticated attempt to deliver the W4SP Stealer on […] Malware
SecurityAffairs.webp 2022-11-03 16:28:32 250+ U.S. news sites spotted spreading FakeUpdates malware in a supply-chain attack (lien direct) >Threat actors compromised a media company to deliver FakeUpdates malware through the websites of hundreds of newspapers in the US. Researchers at Proofpoint Threat Research observed threat actor TA569 intermittently injecting malicious code on a media company that serves many major news outlets. The media company serves The media company provides video content and advertising […] Malware Threat
SecurityAffairs.webp 2022-11-02 18:55:55 SandStrike, a previously undocumented Android malware targets a Persian-speaking religion minority (lien direct) >Threat actors are using previously undocumented Android spyware, dubbed SandStrike, to spy on a Persian-speaking religion minority. In Q3 2022, Kaspersky researchers uncovered a previously undocumented Android spyware, dubbed SandStrike, employed in an espionage campaign targeting the Persian-speaking religion minority, Baháʼí. The threat actors were distributing a VPN app embedding a highly sophisticated spyware. The […] Malware Threat
SecurityAffairs.webp 2022-10-31 14:37:01 Wannacry, the hybrid malware that brought the world to its knees (lien direct) >Reflecting on the Wannacry ransomware attack, which is the lesson learnt e why most organizations are still ignoring it. In the early afternoon of Friday 12 May 2017, the media broke the news of a global computer security attack carried out through a malicious code capable of encrypting data residing in information systems and demanding […] Ransomware Malware Wannacry Wannacry ★★
SecurityAffairs.webp 2022-10-25 14:59:22 Two PoS Malware used to steal data from more than 167,000 credit cards (lien direct) >Researchers reported that threat actors used 2 PoS malware variants to steal information about more than 167,000 credit cards. Cybersecurity firm Group-IB discovered two PoS malware to steal data associated with more than 167,000 credit cards from point-of-sale payment terminals. On April 19, 2022, Group-IB researchers identified the C2 server of the POS malware called MajikPOS. […] Malware Threat
SecurityAffairs.webp 2022-10-21 07:50:12 News URSNIF variant doesn\'t support banking features (lien direct) A new variant of the popular Ursnif malware is used as a backdoor to deliver next-stage payloads and steal sensitive data. Mandiant researchers warn of a significant shift from Ursnif‘s original purpose, the malware initially used in banking frauds is now used to deliver next-stage payloads and steal sensitive data. The new variant, first observed […] Malware
SecurityAffairs.webp 2022-10-17 15:00:10 New UEFI rootkit Black Lotus offered for sale at $5,000 (lien direct) >Black Lotus is a new, powerful Windows UEFI rootkit advertised on underground criminal forums, researcher warns. Cybersecurity researcher Scott Scheferman reported that a new Windows UEFI rootkit, dubbed Black Lotus, is advertised on underground criminal forums. The powerful malware is offered for sale at $5,000, with $200 payments per new updates. The researcher warns that […] Malware
SecurityAffairs.webp 2022-10-15 16:41:24 New PHP Version of Ducktail info-stealer hijacks Facebook Business accounts (lien direct) >Experts spotted a PHP version of an information-stealing malware called Ducktail spread as cracked installers for legitimate apps and games. Zscaler researchers discovered a PHP version of an information-stealing malware tracked as Ducktail. The malicious code is distributed as free/cracked application installers for a variety of applications including games, Microsoft Office applications, Telegram, and others.   Ducktail has been […] Malware
SecurityAffairs.webp 2022-10-12 05:54:56 LockBit affiliates compromise Microsoft Exchange servers to deploy ransomware (lien direct) >Lockbit ransomware affiliates are compromising Microsoft Exchange servers to deploy their ransomware, experts warn. South-Korean cybersecurity firm AhnLab reported that Lockbit ransomware affiliates are distributing their malware via compromised Microsoft Exchange servers. In July 2022, two servers operated by a customer of the security firm were infected with LockBit 3.0 ransomware.  Threat actors initially deployed […] Ransomware Malware Threat
SecurityAffairs.webp 2022-10-11 10:40:22 Experts analyzed the evolution of the Emotet supply chain (lien direct) >Threat actors behind the Emotet bot are continually improving their tactics, techniques, and procedures to avoid detection. VMware researchers have analyzed the supply chain behind the Emotet malware reporting that its operators are continually shifting their tactics, techniques, and procedures to avoid detection. The Emotet banking trojan has been active at least since 2014, the botnet is operated by […] Malware
SecurityAffairs.webp 2022-10-07 05:02:45 LilithBot Malware, a new MaaS offered by the Eternity Group (lien direct) >Researchers linked the threat actor behind the Eternity malware-as-a-service (MaaS) to a new malware strain called LilithBot. Zscaler researchers linked a recently discovered sample of a new malware called LilithBot to the Eternity group (aka EternityTeam; Eternity Project). The Eternity group operates a homonymous malware-as-a-service (MaaS), it is linked to the Russian “Jester Group,” which is […] Malware Threat
SecurityAffairs.webp 2022-10-05 20:21:06 New Maggie malware already infected over 250 Microsoft SQL servers (lien direct) >Hundreds of Microsoft SQL servers all over the world have been infected with a new piece of malware tracked as Maggie. Security researchers Johann Aydinbas and Axel Wauer from the DCSO CyTec have spotted a new piece of malware, named Maggie, that has already infected over 250 Microsoft SQL servers worldwide. Most of the infected instances […] Malware
SecurityAffairs.webp 2022-09-30 05:17:30 Experts uncovered novel Malware persistence within VMware ESXi Hypervisors (lien direct) >Researchers from Mandiant have discovered a novel malware persistence technique within VMware ESXi Hypervisors. Mandiant detailed a novel technique used by malware authors to achieve administrative access within VMware ESXi Hypervisors and take over vCenter servers and virtual machines for Windows and Linux to perform the following actions: Send commands to the hypervisor that will […] Malware
SecurityAffairs.webp 2022-09-29 07:28:01 Go-based Chaos malware is rapidly growing targeting Windows, Linux and more (lien direct) >A new multifunctional Go-based malware dubbed Chaos is targeting both Windows and Linux systems, experts warn. Researchers from Black Lotus Labs at Lumen Technologies, recently uncovered a multifunctional Go-based malware that was developed to target devices based on multiple architectures, including Windows and Linux. The malicious code was developed to target a broad range of devices, […] Malware
SecurityAffairs.webp 2022-09-28 15:43:32 Threat actors use Quantum Builder to deliver Agent Tesla malware (lien direct) >The recently discovered malware builder Quantum Builder is being used by threat actors to deliver the Agent Tesla RAT. A recently discovered malware builder called Quantum Builder is being used to deliver the Agent Tesla remote access trojan (RAT), Zscaler ThreatLabz researchers warn. “Quantum Builder (aka “Quantum Lnk Builder”) is used to create malicious shortcut […] Malware Threat
SecurityAffairs.webp 2022-09-28 13:47:10 APT28 relies on PowerPoint Mouseover to deliver Graphite malware (lien direct) >The Russia-linked APT28 group is using mouse movement in decoy Microsoft PowerPoint documents to distribute malware. The Russia-linked APT28 employed a technique relying on mouse movement in decoy Microsoft PowerPoint documents to deploy malware, researchers from Cluster25 reported. Cluster25 researchers were analyzing a lure PowerPoint document used to deliver a variant of Graphite malware, which is known to be used […] Malware APT 28
SecurityAffairs.webp 2022-09-27 20:39:33 North Korea-linked Lazarus continues to target job seekers with macOS malware (lien direct) >North Korea-linked Lazarus APT group is targeting macOS Users searching for jobs in the cryptocurrency industry. North Korea-linked Lazarus APT group continues to target macOS with a malware campaign using job opportunities as a lure. The attackers aimed at stealing credentials for the victims’ wallets. Last week, SentinelOne researchers discovered a decoy documents advertising positions […] Malware APT 38
SecurityAffairs.webp 2022-09-27 09:40:39 (Déjà vu) Erbium info-stealing malware, a new option in the threat landscape (lien direct) >The recently discovered Erbium information-stealer is being distributed as fake cracks and cheats for popular video games. Threat actors behind the new ‘Erbium’ information-stealing malware are distributing it as fake cracks and cheats for popular video games to steal victims’ credentials and cryptocurrency wallets. The Erbium info-stealing malware was first spotted by researchers at threat […] Malware Threat
SecurityAffairs.webp 2022-09-26 06:22:16 Exmatter exfiltration tool used to implement new extortion tactics (lien direct) >Ransomware operators switch to new extortion tactics by using the Exmatter malware and adding new data corruption functionality. The data extortion landscape is constantly evolving and threat actors are devising new extortion techniques, this is the case of threat actors using the Exmatter malware. Cyderes Special Operations and Stairwell Threat Research researchers spotted a sample […] Malware Tool Threat
SecurityAffairs.webp 2022-09-20 20:49:10 Russian Sandworm APT impersonates Ukrainian telcos to deliver malware (lien direct) >Russia-linked APT group Sandworm has been observed impersonating telecommunication providers to target Ukrainian entities with malware. Russia-linked cyberespionage group Sandworm has been observed impersonating telecommunication providers to target Ukrainian entities with malware. Multiple security firms have reported that the Sandworm APT continues to target Ukraine with multiple means, including custom malware and botnet like Cyclops […] Malware
SecurityAffairs.webp 2022-09-20 05:11:39 IT giants warn of ongoing Chromeloader malware campaigns (lien direct) >VMware and Microsoft are warning of a widespread Chromeloader malware campaign that distributes several malware families. ChromeLoader is a malicious Chrome browser extension, it is classified as a pervasive browser hijacker that modifies browser settings to redirect user traffic. The malware is able to redirect the user's traffic and hijacking user search queries to popular […] Malware
SecurityAffairs.webp 2022-09-19 05:09:43 TeamTNT is back and targets servers to run Bitcoin encryption solvers (lien direct) >AquaSec researchers observed the cybercrime gang TeamTNT hijacking servers to run Bitcoin solver since early September. In the first week of September, AquaSec researchers identified at least three different attacks targeting their honeypots, the experts associated them with the cybercrime gang TeamTNT. The TeamTNT botnet is a crypto-mining malware operation that has been active since April 2020 […] Malware
SecurityAffairs.webp 2022-09-15 15:32:00 Experts warn of self-spreading malware targeting gamers looking for cheats on YouTube (lien direct) >Threat actors target gamers looking for cheats on YouTube with the RedLine Stealer information-stealing malware and crypto miners Researchers from Kaspersky have spotted a self-extracting archive, served to gamers looking for cheats on YouTube, that was employed to deliver the RedLine Stealer information-stealing malware and crypto miners. The RedLine malware allows operators to steal several […] Malware
SecurityAffairs.webp 2022-09-07 16:38:18 Experts spotted a new stealthy Linux malware dubbed Shikitega (lien direct) >A new Linux malware dubbed Shikitega leverages a multi-stage infection chain to target endpoints and IoT devices. Researchers from AT&T Alien Labs discovered a new piece of stealthy Linux malware, dubbed Shikitega, that targets endpoints and IoT devices. The malware outstands for its multistage infection chain, threat actors use it to can gain full control of the system […] Malware Threat
SecurityAffairs.webp 2022-09-06 16:23:32 A new Android malware used to spy on the Uyghur Community (lien direct) >Experts spotted new Android spyware that was used by China-linked threat actors to spy on the Uyghur community in China. Researchers from Cyble Research & Intelligence Labs (CRIL) started their investigation after MalwareHunterTeam experts shared information about a new Android malware used to spy on the Uyghur community. The malware disguised as a book titled “The China […] Malware Threat
SecurityAffairs.webp 2022-09-05 11:44:19 Windows Defender identified Chromium, Electron apps as Hive Ransomware (lien direct) >Microsoft released a Windows Defender update to fix a problem that caused Defender antivirus to identify Chromium, Electron, as malware Microsoft released a Windows Defender update to fix a problem that caused Defender antivirus software to identify the app based on the Chromium browser engine or the Electron JavaScript framework as malware. Multiple users reported […] Ransomware Malware
SecurityAffairs.webp 2022-09-05 08:02:25 A new SharkBot variant bypassed Google Play checks again (lien direct) >Experts spotted an upgraded version of the SharkBot malware that was uploaded to the official Google Play Store. Fox IT researchers have spotted an upgraded version of a SharkBot dropper that was uploaded to the official Google Play Store. While previous variants of the dropper relied on Accessibility permissions to automatically install the Sharkbot malware, […] Malware
SecurityAffairs.webp 2022-09-04 09:14:26 Alleged Iranian threat actors leak the code of their CodeRAT malware (lien direct) >The author of the remote access trojan (RAT) CodeRAT has leaked the source code of its malware on GitHub. The development team behind the remote access trojan (RAT) CodeRAT has leaked the source code of its malware on GitHub after the SafeBreach Labs researchers recently analyzed a new targeted attack aimed at Farsi-speaking code developers. […] Malware Threat
SecurityAffairs.webp 2022-09-02 17:31:54 The Prynt Stealer malware contains a secret backdoor. Crooks steal data from other cybercriminals (lien direct) >The information-stealing malware Prynt Stealer contains a backdoor that allows stealing the data it has infiltrated from victims. Zscaler researchers discovered Telegram channel-based backdoor in the information stealing malware, Prynt Stealer, which allows to secretly steal a copy of the data exfiltrated from the victims. “Zscaler ThreatLabz researchers have uncovered the Prynt Stealer builder, also […] Malware
SecurityAffairs.webp 2022-09-02 12:54:09 Experts link Raspberry Robin Malware to Evil Corp cybercrime gang (lien direct) >Researchers attribute the Raspberry Robin malware to the Russian cybercrime group known as Evil Corp group. IBM Security X-Force researchers discovered similarities between a component used in the Raspberry Robin malware and a Dridex malware loader, which was part of the malicious operations of the cybercrime gang Evil Corp. Raspberry Robin is a Windows worm discovered […] Malware
SecurityAffairs.webp 2022-08-31 16:43:57 GO#WEBBFUSCATOR campaign hides malware in NASA\'s James Webb Space Telescope image (lien direct) A malware campaign tracked as GO#WEBBFUSCATOR used an image taken from NASA’s James Webb Space Telescope (JWST) as a lure. Securonix Threat researchers uncovered a persistent Golang-based malware campaign tracked as GO#WEBBFUSCATOR that leveraged the deep field image taken from the James Webb telescope. The phishing emails contain a Microsoft Office attachment that includes an external reference […] Malware Threat
SecurityAffairs.webp 2022-08-29 13:11:48 Nitrokod crypto miner infected systems across 11 countries since 2019 (lien direct) >Researchers spotted a Turkish-based crypto miner malware campaign, tracked as Nitrokod, which infected systems across 11 countries. Check Point researchers discovered a Turkish based crypto miner malware campaign, dubbed Nitrokod, which infected machines across 11 countries The threat actors dropped the malware from popular software available on dozens of free software websites, including Softpedia and […] Malware Threat
SecurityAffairs.webp 2022-08-25 17:11:38 Nobelium APT uses new Post-Compromise malware MagicWeb (lien direct) >Russia-linked APT group Nobelium is behind a new sophisticated post-exploitation malware tracked by Microsoft as MagicWeb. Microsoft security researchers discovered a post-compromise malware, tracked as MagicWeb, which is used by the Russia-linked NOBELIUM APT group to maintain persistent access to compromised environments.  The NOBELIUM APT (APT29, Cozy Bear, and The Dukes) is the threat actor that […] Malware Threat APT 29
SecurityAffairs.webp 2022-08-23 07:03:34 Counterfeit versions of popular mobile devices target WhatsApp and WhatsApp Business (lien direct) >Experts found backdoors in budget Android device models designed to target WhatsApp and WhatsApp Business messaging apps. Researchers from Doctor Web discovered backdoors in the system partition of budget Android device models that are counterfeit versions of famous brand-name models. The malware targets WhatsApp and WhatsApp Business messaging apps and can allow attackers to conduct […] Malware
SecurityAffairs.webp 2022-08-22 06:47:28 Donot Team cyberespionage group updates its Windows malware framework (lien direct) >The Donot Team threat actor, aka APT-C-35, has added new capabilities to its Jaca Windows malware framework. The Donot Team has been active since 2016, it focuses on government and military organizations, ministries of foreign affairs, and embassies in India, Pakistan, Sri Lanka, Bangladesh, and other South Asian countries. In October 2021, a report released by the Amnesty International revealed that the […] Malware
Last update at: 2024-04-28 10:08:02
See our sources.
My email:

To see everything: Our RSS (filtrered) Twitter