Browsing tag

malware

Everything You Need To Know About WikiLeaks’ Release –Windows, iPhone, Linux, Android, Mac, WhatsApp and Telegram Messages, TVs, Routers, And Modern Cars Are Hackable By CIA

Short Bytes: WikiLeaks has released the complete catalog of CIA’s hacking tools and malware. This revelation by WikiLeaks, named Year Zero, is the first part of a new series Vault 7. It suggests that CIA has plenty of hacking tools to control different computer operating systems, smartphones, routers, smart TVs. etc. On Tuesday, we told you […]

This hard drive will self destruct. Data-wiping malware targets Europe

Meaner strain of Shamoon makes comeback, joined by new, never-before disk wiper. Shamoon—the mysterious disk wiper that popped up out nowhere in 2012 and took out more than 35,000 computers in a Saudi Arabian-owned gas company before disappearing—is back. Its new, meaner design has been unleashed three time since November. What’s more, a new wiper […]

Microsoft Bug Bounty Program: Report Vulnerabilities, Get up to $30,000

For the last couple of year, Google has been releasing details about unpatched vulnerabilities discovered by its researchers in Microsoft’s products. Now, to save itself from further embarrassment Microsoft has launched its bug bounty program in which the company is willing to pay up to $30,000 to hackers and security researchers for reporting flaws in […]

South Korean Retail Giant Lotte’s Website Hacked After US Military Deal

Lotte Group is a multinational corporation having footprints across Asia, Europe and North America. It has headquarters in Seoul, South Korea. Apart from Japan, China is its second major market. Lotte Group started its business operations in China in 1994, and since then it has earned an excellent reputation and following from the Chinese consumers. […]

Hackers Using Unmonitored System Tools, Protocols for Malicious Goals

The IT security researchers at Cisco’s security intelligence and research group Talos have discovered a malware that can fully hide its origins. The sample that the researchers analyzed was utilizing DNS TXT record queries/response for creating a “bidirectional Command and Control channel.” The findings of their research have been published in a report compiled by Edmund Brumaghin and […]

Exclusive: A criminal group using SSH TCP direct forward attack is also targeting Italian infrastructure

Exclusive: MalwareMustDie for Security Affairs released the list of the sites under attack. A criminal gang is using SSH TCP direct forward attack technique. MalwareMustDie is back and has published his the first post of 2017. The popular malware researcher has uncovered a cyber crime gang that is harvesting credentials and credit card numbers from major websites […]

Malware Leveraging PowerSploit

Hi again, this is Shusei Tomonaga from the Analysis Center. In this article, I’d like to share some of our findings about ChChes (which we introduced in a previous article) that it leverages PowerSploit [1] – an open source tool – for infection. Flow of ChChes Infection The samples that JPCERT/CC confirmed this time infect […]

Hundreds of Android Apps on Google Play Store Infected with Windows Malware

Android apps have always remained an easy target of exploitation primarily because of the high number of Android users across the globe. In the latest research analysis from security firm Palo Alto Networks, it was revealed that around 132 Android apps on Google Play store contain malicious coding. This could be due to the use of infected computers by […]

Android Password Manager You Trust Could be Exposing Login Data

According to the latest findings from TeamSIK, a group of security researchers associated with Darmstadt, Germany-based Fraunhofer Institute for Secure Information Technology, a majority of the popular Android password managers are plagued with serious security flaws. As per the information revealed by TeamSIK (technical details), these weaknesses are so severe that user credentials can easily be […]

Massive Necurs Spam Botnet Now Equipped to Launch DDoS Attacks

With more than one million active bots at any time, a Necurs-enabled DDoS attack could dwarf such an attack by the Mirai botnet. In an ominous development, the world’s largest spam botnet has acquired capabilities that could allow it to be used in massive distributed denial-of-service attacks. Security researchers at BitSight’s Anubis Labs recently observed the […]

New Phishing Scam Targets Digital Payment and Online Banking Users

The cyber criminal community widely depends on phishing scams to target unsuspected users, that’s why these attacks are not only increasing but also adding sophisticated means to trick users into giving away their personal and financial details. Recently, security researchers at Cyren discovered a phishing scam targeting banking and digital payment customers worldwide. The targeted platforms […]

Saudi-Iran: Proxy Wars Escalate To Direct Cyber Attacks

The never ending cyber war between Iran and Saudi Arabia has reached a new height – Same goes for the use of Shamoon malware from Iran against the Kingdom. The renewed attacks have come after a four-year sabbatical with what seems like a newer, improved strain of the Shamoon malware virus. The Saudi government had issued a […]

Threat Spotlight: Disttrack Malware

Disttrack’s payload has spread in waves, mainly targeting Saudi Arabia’s critical infrastructure, including, but not limited to: Saudi Aramco, Saudi Arabia’s General Authority of Civil Aviation (GACA), and the Saudi Electric Company, leaving critical systems unusable. It is relentless, stealthy, and persistent as it waits in the shadows of infected computers as a Windows service […]

Malware Uses Blinking Hard Drive LEDs to Transmit Data to Nearby Cameras

Custom-made malware installed on an offline computer can use a hard drive’s LED to send out sensitive data from infected computers to nearby cameras. This Hollywood hacking scenario is now a reality after security researchers from a university in Israel have created such malware and successfully tested it in real-life attacks. The purpose of this […]

Released Android malware source code used to run a banking botnet

The new Android banking malware ESET recently discovered on Google Play was spotted in the wild again, targeting more banks. Further investigation of this resurfacing threat has uncovered its code was built using source code that was made public a couple of months ago. The previous version was detected by ESET as Trojan.Android/Spy.Banker.HU (version 1.1 […]

Chrome Users Beware- Do Not Fall Prey to Missing Font Malware Campaign

Chrome has remained the eye-candy of cyber-criminals lately and the latest hacking campaign is a clear proof of that. NeoSmart Technologies, a renowned cyber-security firm, has identified the presence of a new hacking campaign using JavaScript to manipulate the text on a compromised WordPress website. This way, the malicious code is disguised and as the […]

BugDrop Malware Campaign Obtains Data by Compromising PC Microphones

CyberX, a security firm has discovered that Ukraine is being targeted with an extensive cyber-reconnaissance operation. In this particular campaign, the targets are quite broad range and the basic purpose is to spy on confidential communications of key Ukrainian officials by remotely controlling PC microphones. Apart from Ukraine, CyberX has identified targets in Russia as well […]

TeamSpy malware targeting users through malicious TeamViewer app

TeamSpy data-stealing malware has been detected again. This time, the malware being used in a new campaign that has been discovered by researchers at Heimdal Security. Through using TeamSpy (Pdf), attackers and threat actors can easily gain access and full control over any compromised computer. A majority of the targets seem to be unsuspecting online users, […]

Hackers who took control of PC microphones siphon >600 GB from 70 targets

Critical infrastructure, media, and scientists targeted by suspected nation-state. Researchers have uncovered an advanced malware-based operation that siphoned more than 600 gigabytes from about 70 targets in a broad range of industries, including critical infrastructure, news media, and scientific research. The operation uses malware to capture audio recordings of conversations, screen shots, documents, and passwords, […]