Browsing tag

Hacking

China’s Cyberspies Targeting Southeast Asian Government Entities

A sweeping and “highly active campaign” that originally set its sights on Myanmar has broadened its focus to strike a number of targets located in the Philippines, according to new research. Russian cybersecurity firm Kaspersky, which first spotted the infections in October 2020, attributed them to a threat actor it tracks as “LuminousMoth,” which it […]

Hackers Spread BIOPASS Malware via Chinese Online Gambling Sites

Cybersecurity researchers are warning about a new malware that’s striking online gambling companies in China via a watering hole attack to deploy either Cobalt Strike beacons or a previously undocumented Python-based backdoor called BIOPASS RAT that takes advantage of Open Broadcaster Software (OBS) Studio’s live-streaming app to capture the screen of its victims. The attack […]

3 Steps to Strengthen Your Ransomware Defenses

The recent tsunami of ransomware has brought to life the fears of downtime and data loss cybersecurity pros have warned about, as attacks on the energy sector, food supply chain, healthcare industry, and other critical infrastructure have grabbed headlines. For the industry experts who track the evolution of this threat, the increased frequency, sophistication, and […]

Watch Out! Zyxel Firewalls and VPNs Under Active Cyberattack

Taiwanese networking equipment company Zyxel is warning customers of an ongoing attack targeting a “small subset” of its security products such as firewall and VPN servers. Attributing the attacks to a “sophisticated threat actor,” the firm noted that the attacks single out appliances that have remote management or SSL VPN enabled, namely in the USG/ZyWALL, […]

NVIDIA Jetson Chipsets Found Vulnerable to High-severity Flaws

U.S. graphics chip specialist NVIDIA has released software updates to address a total of 26 vulnerabilities impacting its Jetson system-on-module (SOM) series that could be abused by adversaries to escalate privileges and even lead to denial-of-service and information disclosure. Tracked from CVE‑2021‑34372 through CVE‑2021‑34397, the flaws affect products Jetson TX1, TX2 series, TX2 NX, AGX […]

North Korea Exploited VPN Flaw to Hack South’s Nuclear Research Institute

South Korea’s state-run Korea Atomic Energy Research Institute (KAERI) on Friday disclosed that its internal network was infiltrated by suspected attackers operating out of its northern counterpart. The intrusion is said to have taken place on May 14 through a vulnerability in an unnamed virtual private network (VPN) vendor and involved a total of 13 […]

[eBook] 7 Signs You Might Need a New Detection and Response Tool

It’s natural to get complacent with the status quo when things seem to be working. The familiar is comfortable, and even if something better comes along, it brings with it many unknowns. In cybersecurity, this tendency is countered by the fast pace of innovation and how quickly technology becomes obsolete, often overnight. This combination usually […]

Hackers from Cl0p ransomware group arrested, infrastructure seized

This year, Cl0p ransomware operators have regularly appeared in the news. The group has been striking businesses worldwide espicially to extort money from businesses based in the United States. In the latest, the Ukrainian police has confirmed carring out an operation against hackers affiliated with Cl0p ransomware. The operation was a joint collaboration with law […]

Researchers Uncover ‘Process Ghosting’ — A New Malware Evasion Technique

Cybersecurity researchers have disclosed a new executable image tampering attack dubbed “Process Ghosting” that could be potentially abused by an attacker to circumvent protections and stealthily run malicious code on a Windows system. “With this technique, an attacker can write a piece of malware to disk in such a way that it’s difficult to scan […]

Malware infected Minecraft modpacks hit Google Play Store

Minecraft is a top-rated game with followers spread worldwide. However, if you are a Minecraft player, you must exercise caution and do some research before installing the game’s add-ons, apps, plug-ins and mods, warns the cybersecurity giant Kaspersky. According to researchers, Minecraft continues to attract the hacking community and a massive increase in infected, malware-laden […]

Revil ransomware gang claims breaching US nuclear weapons contractor

Sol Oriens, a US-based nuclear weapons contractor, has become a cyberattack from the REvil ransomware gang. Hackers have said that they will auction the data that was stolen during the attack. On the other hand, according to the Sol Oriens, the attack is being investigated by a consultancy firm that works with the Department of […]

Experts Shed Light On Distinctive Tactics Used by Hades Ransomware

Cybersecurity researchers on Tuesday disclosed “distinctive” tactics, techniques, and procedures (TTPs) adopted by operators of Hades ransomware that set it apart from the rest of the pack, attributing it to a financially motivated threat group called GOLD WINTER. “In many ways, the GOLD WINTER threat group is a typical post-intrusion ransomware threat group that pursues […]

Game giant Electronic Arts is the latest victim of massive data breach

A hacker is claiming to have stolen 780GB worth of data Electronic Arts (EA) including source code. Electronic Arts (EA) is one of the leading game publishers in the industry. The company has confirmed that hackers have stolen valuable information from the company, and around 780GB of data was compromised. EA is among the largest […]

Hackers Can Exploit Samsung Pre-Installed Apps to Spy On Users

Multiple critical security flaws have been disclosed in Samsung’s pre-installed Android apps, which, if successfully exploited, could have allowed adversaries access to personal data without users’ consent and take control of the devices. “The impact of these bugs could have allowed an attacker to access and edit the victim’s contacts, calls, SMS/MMS, install arbitrary apps […]

Emerging Ransomware Targets Dozens of Businesses Worldwide

An emerging ransomware strain in the threat landscape claims to have breached 30 organizations in just four months since it went operational, riding on the coattails of a notorious ransomware syndicate. First observed in February 2021, “Prometheus” is an offshoot of another well-known ransomware variant called Thanos, which was previously deployed against state-run organizations in […]

FBI recovers millions in ransom from DarkSide ransomware gang

The DarkSide ransomware gang was behind the attack on Colonial Pipeline, the largest fuel pipeline in the United States – The recovered ransom payment also belongs to the Pipeline.  A live-streamed joint press conference from the US Department of Justice (DoJ) and the FBI revealed that $2.3 million worth of cryptocurrency had been recovered from […]

Google Chrome to Help Users Identify Untrusted Extensions Before Installation

Google on Thursday said it’s rolling out new security features to Chrome browser aimed at detecting suspicious downloads and extensions via its Enhanced Safe Browsing feature, which it launched a year ago. To this end, the search giant said it will now offer additional protections when users attempt to install a new extension from the […]

The Vulnerabilities of the Past Are the Vulnerabilities of the Future

Major software vulnerabilities are a fact of life, as illustrated by the fact that Microsoft has patched between 55 and 110 vulnerabilities each month this year – with 7% to 17% of those vulnerabilities being critical. May had the fewest vulnerabilities, with a total of 55 and only four considered critical. The problem is that […]

Experts Uncover Yet Another Chinese Spying Campaign Aimed at Southeast Asia

An ongoing cyber-espionage operation with suspected ties to China has been found targeting a Southeast Asian government to deploy spyware on Windows systems while staying under the radar for more than three years. “In this campaign, the attackers utilized the set of Microsoft Office exploits and loaders with anti-analysis and anti-debugging techniques to install a […]

US Seizes Domains Used by SolarWinds Hackers in Cyber Espionage Attacks

Days after Microsoft, Secureworks, and Volexity shed light on a new spear-phishing activity unleashed by the Russian hackers who breached SolarWinds IT management software, the U.S. Department of Justice (DoJ) Tuesday said it intervened to take control of two command-and-control (C2) and malware distribution domains used in the campaign. The court-authorized domain seizure 1m took […]

Canada Post discloses data breach after malware attack

According to Canada Post, sensitive information of over 950,000 customers and 44 of its large business clients has been exposed in the malware attack. Another day, another data breach. This time, the victim is the Canadian postal agency Canada Post who on Wednesday confirmed in a press release that data of over 950,000 of its customers could […]