Browsing category

Malware

Malicious Android Dropper App ‘Xhelper’ Reinstall Itself after Uninstall – Infected 45K Devices

Researchers observed a persistent malicious Android dropper app dubbed XHelper capable of reinstalling itself again if users uninstalled from the devices. The malicious app is persistent, once the app installed it hides and downloads other malware, displays pop-up ads. The malware found to be downloaded from unknown sources, not available with Google play. Android Trojan […]

Mysterious malware that re-installs itself infected over 45,000 Android Phones

Over the past few months, hundreds of Android users have been complaining online of a new piece of mysterious malware that hides on the infected devices and can reportedly reinstall itself even after users delete it, or factory reset their devices. Dubbed Xhelper, the malware has already infected more than 45,000 Android devices in just […]

Beware!! 17 Malicious Apps From Apple App Store Infect the iPhone Users with Clicker Trojan Malware

Researchers discovered 17 malicious apps in the Apple app store that delivers the clicker trojan malware into iPhone users and generate ad revenue. Attacker abuse iphone users by carrying out ad fraud-related tasks in the background and click the ads or link that continuously open the web page without any user interaction. GBHackers reported several incidents related […]

Russian Turla APT Group Hacked Iranian APT C2 Server For Backdoor Access To Expand The Cyber Attack

Hackers-Hack-Hackers: Russian APT group Turla known as Waterbug compromised the Iranian hacker’s command and control server infrastructure, and the Exfiltrated of data to expand their cyber attack in wide. Turla is a well-known APT hackers group using various tools and techniques to target the government, military, technology, energy, and commercial organizations and gathering intelligence. GBHackers […]

NFC Beaming Vulnerability in Android Let Hackers to Infect Vulnerable Devices With Malware

NFC expanded as Near Field Communication, contains a set of protocols that allows Android devices to establish communication at a very shortest range. NFC used for contactless payments, pairing of devices, file sharing, and access control. Nightwatch Cybersecurity noted that “NFC beaming of applications between devices using Android OS bypasses some security controls such as […]

Russian Hackers Compromised 100,000+ Computers Using Raccoon Malware Via Fallout & RIG Exploit Kits

Researchers uncovered an information-stealing malware called Raccoon that delivered by the Fallout and RIG Exploit Kits to steal sensitive data from compromised victims’ devices. Raccoon malware reportedly hacked more than 100,000 computers around the world since April 2019, and the malware believed to be delivered from a team of Russian hackers. Malware doesn’t use any stealthy infection technique, and […]

These 17 iOS apps contain malware, uninstall them immediately

A group of ethical hacking experts has discovered a malware variant present in at least 17 apps for Apple, all available in the App Store. The company has started to remove malicious apps from the official store, although it is reported that a considerable number of users would have downloaded at least one of these […]

Gustuff Android Banking Malware Uses SMS Messages to Hack Users Device

Gustuff banking malware returns with new features, the threat actors behind Gustuff malware made changes with distribution hosts and disabled C2 infrastructure. The malware uses SMS messages for propagation. The Gustuff malware is a fully automated one, the malware is capable of stealing login credentials by abusing Accessibility Services in Android devices. Researchers observed that […]

Winnti Hacker Group Uses New Malware to Hack Microsoft SQL Servers

Winnti hacker group uses a new malware dubbed skip-2.0 to attack Microsoft SQL Servers and to gain persistence access. Winnti group believed to be operating from China and the group active at least from 2012 and responsible for high-profile supply-chain against Gaming studios and Software companies. ESET Security researchers discovered a new malware strain skip.2-0 […]

Chinese hackers could install backdoors on Microsoft SQL 11 and 12 servers using a “magic word”

The activities of government-sponsored hacker groups can have disastrous consequences. A group of digital forensics experts from ESET has revealed the existence of a new malware developed by Winnti, a hacking group backed by the Chinese government, with the purpose of gaining persistence in a targeted Microsoft SQL Server system. Identified as skip-2.0, this malware […]

Free music files on the Internet could contain malware and backdoors

Digital forensics specialists report a new attack method consisting of the use of WAV audio files to hide and deliver backdoors and software for the mining of the Monero cryptocurrency on infected systems. Other variants of this method injected malware by hiding their payloads in JPEG or PNG image files using steganography, a technique widely […]

Winnti Hackers Group Launching New Malware via Supply-chain Attacks to Inject Backdoor in Windows

Researchers discovered a new malware campaign from the Winnti threat group that utilizes the supply-chain attacks with a new set of artifacts to inject a sophisticated backdoor in windows computers. Winnti group activities are being monitored since 2013, since then it continuously targeting various private sectors including Aviation, Gaming, Pharmaceuticals, Software development, Telecommunication and Technology that […]