Browsing category

Incidents

Rex Linux Trojan Can Launch DDoS Attacks, Lock Websites, Mine for Cryptocurrency

Trojan targets CMS platforms running on Linux servers. What initially looked like a string of Drupal sites infected with ransomware (that didn’t work properly) now looks like a professional cybercrime operation that relies on a self-propagating Linux trojan to create a botnet with various capabilities. Last May, in a Softpedia exclusive, Stu Gorton, CEO and Co-Founder […]

New DetoxCrypto Ransomware pretends to be PokemonGo or uploads a Picture of your Screen

A new ransomware called DetoxCrypto has been discovered by MalwareHunterTeam that is currently being distributed under two different variants. The first variant looks like a generic ransomware but contains the interesting feature of taking a screenshot of your acting Windows screen when it is installed. The second variant is trying to take advantage of the immense popularity of […]

Bitcoin.org suspects state-sponsored attacks on the horizon

Bitcoin traders have been warned that the upcoming Bitcoin Core software release will become a top target for well-funded hacking groups. Bitcoin.org has warned users to be aware that the upcoming release of Bitcoin Core is likely to be targeted by state-sponsored cyberattackers. The group which manages Bitcoin Core , the client used to keep the […]

Aveo Trojan Used in Attacks Against Japanese Users

Palo Alto Networks has identified a malware family known as ‘Aveo’ that is being used to target Japanese speaking users. The ‘Aveo’ malware name comes from an embedded debug string within the binary file. The Aveo malware family has close ties to the previously discussed FormerFirstRAT malware family, which was also witnessed being used against […]

Starwood, Marriott, Hyatt, IHG hit by malware: HEI

A data breach at 20 U.S. hotels operated by HEI Hotels & Resorts for Starwood, Marriott, Hyatt and Intercontinental may have divulged payment card data from tens of thousands of food, drink and other transactions, HEI said on Sunday. The breach follows similar attacks at Hyatt Hotels Corp (H.N) and Starwood Hotels & Resorts Worldwide […]

World Anti-Doping Agency Site Hacked; Thousands of Accounts Leaked

ANONYMOUS POLAND HACKED WORLD ANTI-DOPING AGENCY AND COURT OF ARBITRATION FOR SPORT’S SERVERS’ SERVER AND LEAKED PERSONAL DETAILS FOR GOD KNOWS WHAT REASON! A Twitter account claiming affiliation with Anonymous Poland hacktivist group recently contacted HackRead with a data file stolen from the World Anti-Doping Agency and Court of Arbitration for Sport’s servers (WADA-CAS). The hacker […]

Instagram accounts hacked, altered to promote adult dating spam

Scammers are hacking Instagram accounts and altering profiles with sexually suggestive imagery to lure users to adult dating and porn spam. Earlier this year, we reported an influx of fake Instagram profiles luring users to adult dating sites. Over the last few months, we have observed Instagram accounts being hacked and used to promote adult […]

Oracle-owned point-of-sale service suffers from malware attack

A Russian organized cybercrime group known for hacking into banks and retailers appears to have breached hundreds of computer systems at software giant Oracle Corp., KrebsOnSecurity has learned. More alarmingly, the attackers have compromised a customer support portal for companies using Oracle’s MICROS point-of-sale credit card payment systems. Asked this weekend for comment on rumors of a large data breach […]

How hackers used this Trojan malware to spy on a territorial dispute

F-Secure researchers say parties involved in the South China Sea arbitration case were infected with the data-stealing NanHaiShu Trojan. Hackers have used targeted malware to steal data from some of the governments and private sector organisations involved in the dispute over territory and sovereignty in the South China Sea. Cybersecurity company F-Secure Labs uncovered the […]

This $6 Hacker Tool Pops Cash Registers And Hotel Rooms Wide Open

It’s no secret hotel rooms can be hacked into. One security researcher has now created a cheap, discrete device the size of a card deck that can open guest rooms at a rapid speed. But it’s more than a one-trick pony: it can carry out attacks on point-of-sale systems too, even popping open cash registers. Just last year, hacker hero Samy […]

Renaming Office Files Is Enough to Disguise Macro Malware

Macros have been used since the mid 1990s to spread malware and infect systems. Increased user awareness of the need to disable the macro function within Microsoft Word during the late 90s and early 2000s sent these malware into decline. However, a change in Microsoft (MS) Office file formats dating from 2007 is now being […]

Windows Flaw Reveals Microsoft Account Passwords, VPN Credentials

Attack from the ’90s resurfaces more deadly than before. A flaw in how Windows handles old authentication procedures for shared network resources can leak a user’s Microsoft account username and password, or VPN credentials if the user is using a VPN to surf the Internet. The exploit relies on an attacker embedding a link to an […]

Threat Actors Using Legitimate PayPal Accounts To Distribute Chthonic Banking Trojan

While many email providers, clients, and anti-spam engines have become adept at detecting spam, malicious messages sent via high-profile, legitimate providers are much harder to catch. Threat actors continue to look for new ways to bypass these engines and, in the latest example of innovative approaches to malware distribution, have managed to co-opt PayPal services […]

Niantic CEO John Hanke’s Twitter Account Hacked

Fueled by the lack of Pokémon GO in Brazil, a hacker group called OurMine took control of Niantic CEO John Hanke’s Twitter account today. Hanke and the development team at Niantic Labs in San Francisco had no idea how much of an impact Pokémon GO would have in the mobile space when it began rolling […]

Proxy PAC hack allows for intercept of HTTPS URLS

Israeli experts discovered a vulnerability within the JavaScript that proxy PAC files that allows HTTPS URLs interception via Proxy Attacks. Israeli security firm, Safebreach, has discovered a vulnerability within the JavaScript that proxy PAC files used for auto-configuration. Hackers could be used to extrapolate URLs and manipulate them. Proxy Auto Config or PAC files work […]

LulzSec Member Reveals More Details About GCHQ Covert Operations

GCHQ’s JTRIG team targeted more than hacktivists. Mustafa Al-Bassam, aka tFlow, co-founder of the LulzSec hacking crew, published today more details about how the GCHQ used the covert Joint Threat Research Intelligence Group (JTRIG) to attack hacktivism crews, but also that they tried to influence elections in Iran and boost and help the Arab Spring uprising […]

Scammers exploit recent wave of attacks to trick victims with phishing attacks

Scammers exploit the recent a wave of attacks to trick victims with phishing offensive and steal sensitive data from the unaware users. Crooks always exploits the media attention on tragic events for their illegal activities and trick victims with social engineering techniques. Experts observed scammers in the past exploiting news like the crash of Malaysia Airlines […]