Browsing tag

cyber security news

Plurox Modular Malware Spreads Over Local Network and Provide Access to Attackers for Installing Additional Malware

A new malware dubbed Plurox spread itself over the local network using EternalBlue exploit and let attackers gain access to the network to install miners and other malware on the victim’s machine. The malware is modular, which means; attackers can expand its functionality by adding additional plugins, as required. Kaspersky researchers discovered the malware in […]

Messaging Service Telegram Hit by a Powerful DDoS Attack

The secure messaging app Telegram hit by a powerful DDoS attack and the users in united states and other countries may experience connection issues with Telegram. Telegram is a free instant messaging app like WhatsApp, well-known for its encryption, privacy, and self-destructive private messages. With Telegram, you can access your messages across multiple devices. — […]

Who and Why Make DDoS Attacks on The Site of Colleges and Universities ?

Sites of colleges and universities are constantly subject to DDOS attacks. But who does it? do students really need to drop sites?” Hacking is a major vice of this generations young adult. Usually, it starts with the basics like hacking Wi-Fi password or a Facebook or Instagram account for pranks or just to be mean […]

Iranian MuddyWater APT Hackers Adds New Exploits in Their Hacking Arsenal to Attack Government Networks

Threat actors from MuddyWater APT groups now add a new set of latest exploits to their hacking arsenal and tactics, techniques and procedures (TTPs) to target government entities and telecommunication sectors. Iran sponsored MuddyWater group operating by advanced persistent threat actors and this APT group was initially spotted in 2017, they are mainly targeting the […]

BlackSquid Malware Uses Eight Exploits to Attack Web Servers, Network Drives, and Removable Drives

A new malware dubbed BlackSquid bags eight notorious exploits to drop XMRig Monero cryptocurrency miner targeting web servers, network drives, and removable drives. The malware employs several anti-virtualization, anti-debugging, and anti-sandboxing methods to avoid detection. If the malware detects any sandboxes, it immediately cancels the infection process to avoid detections. Trend Micro observed that BlackSquid […]

Quest Diagnostics Says Nearly 12 Million Patients Records Exposed in Data Breach

Quest Diagnostics has confirmed a data breach that exposes 11.9 million patients records that includes financial data, Social Security numbers, and medical information. Quest Diagnostics is lab testing provider of diagnostic testing, information, and services that patients and doctors used to make better healthcare decisions. The breach happened through a contractor of a contractor, Quest […]

Hacker Group Behind GozNym Banking Malware Dismantled by International Authorities that Stolen $100 Million

International law enforcement operation brings down a globally operated and well-organized cybercrime network behind GozNym banking malware responsible for stealing $100 million from more than 41,000 victims. The GozNym banking malware primarily targeted financial institutions; it includes a banking trojan and trojan downloader, which also has the function of ransomware. GozNym distributed through phishing emails, […]

Hacking Group Fxmsp Claims they Hacked 3 Major US Antivirus Companies

Fxmsp is a collective of Russian- and English-speaking hackers, they are primarily targeting on highly protected networks to exfiltrate sensitive details from corporate’s and government entities. The hacking group operating since 2017 and they know for targeting corporate and government networks worldwide. According to the new report from Advanced Intelligence LLC, the hacker group has […]

Miner Malware Uses Multiple Propagation Methods to Infect Windows Machines and to Drop Monero Miner

A miner malware that uses a number of techniques that includes EternalBlue, Powershell abuse, pass-the-hash technique, Windows admin tools, and brute force to infect windows machine and to drop a Monero miner. According to Trend Micro telemetry, the threat actors behind the campaign expands botnet to other countries that include Australia, Taiwan, Vietnam, Hong Kong, […]

Settlement At Last: The Never-Ending Yahoo Nightmare

The nightmare of Yahoo is still not ending, this is because their planned settlement agreement with its customers affected by a data breach episode was shut down by U.S. California District Court Judge Lucy Koh. Judge Koh arrived at her decision given that Yahoo is a settlement with the victims of the data breach with […]

Hackers Hijacked Popular Video Editing Software Website to Drop Sophisticated Malware via Download Links

Hackers hijacked the official website of the popular video editing software and replaced the download links, causing the users to download the banking malware. VSDC is the popular video editing software and the company official website has nearly 1.3 million monthly visits. Hackers hijacked the download links that causing visitors to download the dangerous banking […]

DHS and FBI Uncovered North Korean Government Owned Hoplight Malware in Government Network

DHS and FBI discovered a new sophisticated malware called “Hoplight” which is operated by the North Korean Government as Hidden Cobra spotted on U.S government network. This sophisticated malware variant used by the North Korean government to perform various cyber attack that targets various organization and Governments. Researchers discovered nine malicious executable files that is […]

Hackers Used US-based Web Servers to Distribute 10 Malware Families Via Weaponized Word Documents

Hackers used hosting infrastructure in the United States to host 10 malware families and distributed them through mass phishing campaigns. The hosted malware families include five banking Trojans, two ransomware and three information stealer malware families. The malware includes familiar ones such as Dridex, GandCrab, Neutrino, IcedID, and others. Malware Family Type Dridex Banking Trojan […]

Hackers Deliver Banking Malware Through Password Protected ZIP File

Hackers continue to employ new techniques to evade detection from antivirus and other security products. This time they started using previously reported and widely used BOM technique. Previously Russian hacker groups used this technique to modify the hosts file on Windows systems. The Byte Order Mark additional helps the threat actor groups to stay under […]

Operation SaboTor – Law Enforcement Agencies Arrested 61 Dark Web Users Who are Buying & Selling Malware

Law enforcement agencies announced the results of Operation SaboTor, a coordinated international operation targeting vendors and buyers of dark web market places. As a result of the operation, law enforcement agencies made 61 arrests and shuts down 50 Darknet accounts used for illegal activities. The joint operation between Europol, FBI, and DEA conducted between January […]