Browsing category

Malware

Chinese APT 10 Hackers Attack Government and Private Organizations Through Previously Unknown Malware

Researchers discovered a new malware attacker against the government and private organizations from Chinese cyber espionage group APT10 using previously unknown malware with a new set of unique activities. Based on telemetry data, attackers launching two different loader variants and various other payloads with similar Tactics, Techniques that were used for other attacks by APT10. APT10 […]

Hackers infect MySQL servers with GandCrab ransomware

Web application security course specialists report an attack campaign deployed by a group of Chinese hackers, which are looking for Windows servers running MySQL databases to infect them with the ransomware variant known as GandCrab. Members of the cybersecurity community claim that this attack vector had not been detected before. “The most common thing for […]

Banking Malware grew 60% this year, how to protect your bank accounts

As mobile banking and online banking services grow, the threat actors’ interest in exploiting these platforms is also spreading. According to experts in data protection services, hackers have recently tried to develop banking malware capable of exploiting security vulnerabilities in the implementation of these services, increasingly widespread. We will then review some measures that can […]

Should the Government of Baltimore or not pay ransom from cyberattack?

A few weeks ago website security audit specialists reported a ransomware attack on the Baltimore government’s computer infrastructure in which hackers managed to compromise some of the city’s IT systems. After the cyberattack the city government had two options, investing months of hard work to restore the compromised systems, or pay the hackers the ransom […]

Automated Malware Analysis in the Cloud

Cybercriminals execute malware attacks using different attack vectors and using different methods. The number of malware strains is increasing in an unprecedented manner and hence malware analysis today is not an easy job. In the present context, automated malware analysis is a necessity. Let’s discuss today the different aspects of automated malware analysis in the […]

MuddyWater APT’s BlackWater Malware Campaign Install Backdoor on Victims PC to Gain Remote Access & Evade Detection

Researchers discovered a “Blackwater” malware campaign that suspected to associated with well known MuddyWater APT bypass the security control and install a backdoor on Victims PC using MuddyWater’s tactics, techniques, and procedures (TTPs). MuddyWater involved with a various cyber attack in recent past and its spotted to targeting organizations in Pakistan, Turkey, and Tajikistan using […]

Law Enforcement Operation Dismantles GozNym Banking Malware

An international law enforcement operation has led to the dismantling of the global cybercrime networkcybercrime network that used the GozNym banking malware to steal money from bank accounts across the world. TechCrunch reports, “Europol and the U.S. Justice Department, with help from six other countries, have disrupted and dismantled the GozNym malware, which they say […]

8 Common Hacking Techniques & 3 Ways to Avoid Them All

Hackers come in many forms with sophisticated Hacking Techniques, While there has been a lot of discussion about online security in recent years, many people are still unfamiliar with the types of attacks they are most likely to be targeted by. Knowing what’s out there is clearly important when it comes to keeping yourself safe […]

Hackers Launching Unique Windows and MacOS Malware via Fake WhatsApp Official Website

Researchers discovered a new malware that infect MacOS via malicious website by disguised as WhatsApp official website where it also drops a malware for Windows Operating system. Attackers are targeting both Windows and MacOS operating system to injecting a backdoor that helps to execute malicious code from a remote server. Backdoor named as Mac.BackDoor.Siggen.20 gets on […]

Hackers install backdoor on Asus computers using company update

Threat actors have compromised the Asus technology manufacturer update mechanism to install malware that allows installing a backdoor on compromised computers. According to web application security testing experts, this is due to a Man-In-The-Middle (MiTM) attack campaign against routers to exploit some unsecured HTTP connections between Asus computer users and company servers. This malware, known […]

Hacker Group Behind GozNym Banking Malware Dismantled by International Authorities that Stolen $100 Million

International law enforcement operation brings down a globally operated and well-organized cybercrime network behind GozNym banking malware responsible for stealing $100 million from more than 41,000 victims. The GozNym banking malware primarily targeted financial institutions; it includes a banking trojan and trojan downloader, which also has the function of ransomware. GozNym distributed through phishing emails, […]

RCE Bug in Microsoft RDP Protocol Let Hackers Perform WannaCry Level Attack on 3 Million Vulnerable Endpoints

A critical remote execution vulnerability in Microsoft remote desktop services enables let attackers compromise the vulnerable system with WannaCry level malware. Microsoft recently fixed this RCE vulnerability in Remote Desktop Services – formerly known as Terminal Services, and it’s affected some of the old version of Windows. A WannaCry attack was one of the notorious […]

Laptop Running Six Most Dangerous Malware up for Auction

This is news! A laptop containing six of the most dangerous of malware created till date is up for auction. A Samsung NC10-14GB 10.2-Inch Blue Netbook, which contains six such malware strains which together have caused damages worth $95B over the years, has been put up for auction. This laptop has in fact been isolated and […]

Hackers Distribute PLEAD Malware through Supply-chain and man-in-the-middle Attack

Security researchers a new malware campaign that delivers Plead malware by abusing legitimate software that developed by ASUS Cloud Corporation. The PLEAD malware found to be active since 2012, and the executables are signed with the stolen certificate. The new campaign executed through a legitimate process named AsusWSPanel.exe, which is the windows client for ASUS […]

Spyware hacks dozens of smartphones via WhatsApp

Information security audit specialists have reported the existence of a spyware developed by a hacking group for hire that has exploited vulnerability in WhatsApp, the most popular instant messaging service in the world, to remotely kidnap dozens of smartphones. In a statement published by the company it is only mentioned that the attackers are “a […]