Browsing tag

computer security

SpeakUp – A New Undetected Backdoor Exploiting Six Linux Distributions With Known Vulnerabilities

A new trojan dubbed SpeakUp exploiting six different Linux distributions with know vulnerabilities. The campaign primarily targeting East Asia and Latin America, including AWS, hosted machines. Security researchers from checkpoint detected the campaign that implants the backdoor and evades the detection from all security vendors. The trojan dubbed SpeakUp propagates with the infected subnet and […]

OceanLotus(APT32) Threat Actor Group Deliver KerrDown Malware Via Word Document and RAR Archive

OceanLotus group known for Multiple attack campaigns around the globe, the threat actor group targets private sectors across multiple industries, foreign governments, activists, and dissidents connected to Vietnam. Palo Alto Networks’ Unit 42 division researchers observed a new custom malware family dubbed “KerrDown” used by the threat actor group since 2018. This ongoing campaign primarily […]

Hackers Bypass Google Filters & Launching CSV Malware via Google Sheets

Cybercriminals are using new sophisticated techniques to spread CSV malware via Google sheets instead of using Microsoft Excel sheet which is often used by malicious hackers. Cyber attackers are day today increasing and the attackers are always one step ahead to launching sophisticated cyber attackers which is very difficult to detect and mitigate. Basically .CSV […]

APT39 Hacking Group Launch Widespread Attack Focused on Personal Information

Iranian cyber espionage group APT39 focus on stealing on personal information o perform monitoring, tracking, or surveillance operations against specific individuals. The group carrying a widespread campaign focused their operations in the Middle East, the U.S. and South Korea. Following are the industries targeted including telecommunications, travel industries, high-tech industry, and government entities. “We have […]

FORMBOOK Malware Delivered via Weaponized RTF Word Docs – Using CVE-2017-11882

Formbook campaign with what looks like a few changes. Recently the criminals distributing this malware have been using .exe files inside various forms of an archive, including .iso, .ace, .rar. , zip. Frequently they use various Microsoft Office Equation Editor exploits to contact a remote site & download the payload. Very occasionally I have seen […]

Hackers Now Launching Powerful Weaponized PDF Exploit using Steganography Technique

Cyber Criminals now using new Stenography technique to distribute a powerful Obfuscated PDF exploit in order to compromise the targets and evade the detection. Malicious hackers are always finding new techniques to exploit the vulnerabilities and compromising victims machine without more user interaction to increase the success ratio of the attack. Steganography is the technique […]

A new Ransomware Anatova Which Hides as Game or Application

A new Ransomware called Anatova has been discovered in a private peer to peer network which is believed to be a very serious threat. This code is prepared for a modular extension that also checks for connected network-shares and will encrypt the files on the identified shares too. Outline of Anatova Anatova uses the icon […]

773 Million Credentials of Email & Password leaked in Massive Data Breach – Biggest Data Dump Ever Found on a Decade

Welcome to the Massive Data breach of 2019, around 773 million datas contains email addresses and passwords were breached and circulated in hacker forums. This data breach seems to be bigger and critical than earlier breaches like “Equifax” and “Marriott International“. Let’s have a look into This Massive Data Breach The data set was first […]

Chrome Extension That Steals Credit Cards Numbers Detected On Web Store

A chrome extension that still available on Chrome Web Store steals the payment card information from website forms visited by the users. The extension found to be active form February 2018, and the extenstion hidden from regular searches and will be available only through the link that attackers use to spread. Malicious extension named Reader […]

USB-IF Launches USB Type-C Authentication Program To Protect Against From Malicious Devices

USB-IF announced USB Type-C Authentication Program to confirm the authencity of the USB device USB device, USB cable or USB charger. The Authentication program is the milestone for USB security protocol. The authentication program protect against non-compliant USB chargers and to mitigate risks from malicious firmware/hardware in USB devices attempting to exploit a USB connection. […]

Beware of Pre-Installed Mobile Malware in Device System Level Before Shipping

A new landscape study states that an upcoming mobile devices may comes with per-installed mobile malware along with malicious code in it. Per-installed malware means that the mobile device already installed with malicious code in system level that cannot be removed easily. There are two types of pre-installed malware that is based on the apps […]

2.4 Million Blur Password Manager Users Data Exposed Online

More than 2.4 million Blur password manager users data has been exposed online, the Blur password management service owned by Abine. According to Blur, the hackers intruded on December 13th, 2018 and they are working with law enforcement officials to determine how the intrusion occurred. The file containing the user’s information that is prior to […]

The Universal Importance of IAM (Identity and Access Management) In A Firm

The tendency for companies to adopt consumer technologies (also known as commoditization) is increasing rapidly and that means a change in the operation and management of corporate environments and business applications. Organizations have the opportunity to take advantage of these technologies to increase the productivity of their employees and not only the efficiency but also […]

Hackers Using Weaponized Memes to Communicate with Malware for Malicious Operations

Researchers recently observed that cyber criminals using a weaponized memes in order to communicate with malware for various malicious operations. Memes are nowadays using for fast communication methods to spreading news which is now abused by cyber criminals to reach victims in a very effective way. Attackers using Steganography to embed the malicious payload inside of […]