Browsing tag

Infosec

World’s Largest DDoS Attack: US Firm Suffers 1.7 Tbps of DDoS Attack

Last week we reported on the world’s largest DDoS attack that hit Github website and caused a brief service disruption. The 1.35 Tbps DDoS attack was carried out by exploiting a recently exposed critical vulnerability in unsecured Memcached servers. Now, the IT security researchers at DDoS protection firm Arbor Networks have confirmed that a US service provider […]

ComboJack Malware Steals Cryptocurrency by Modifying Addresses

A new cryptocurrency-stealing malware dubbed as ComboJack has been discovered by Palo Alto Networks Unit 42 and Proofpoint researchers. It has been targeting cryptocurrencies and digital wallets belonging to American and Japanese users while the malware is being distributed via email spam campaign. Fake Passport Email The malicious emails contain the subject line “Re: passport…” […]

Life-saving Pacemakers, Defibrillators Can Be Hacked and Turned Off

Pacemakers and implantable cardioverter defibrillators (ICDs) are lifesaving devices but malicious actors can exploit vulnerabilities and result of it can be life-threatening. If you think that computers have remained the apple of hackers’ eyes then you are mistaken because according to a research paper published in the JACC (Journal of the American College of Cardiology), there […]

Tor Proxy Used By Cybercriminals To Initiate Bitcoin Theft

Tor proxy owners are replacing Bitcoin payment addresses to divert payments from ransomware victims to their own wallets. The IT security researchers at Proofpoint have discovered a new type of attack/scam in which cybercriminals are becoming victims of other cybercriminals – In this attack, cybercriminals are found using Tor proxy sites to steal Bitcoin which were originally […]

Unprotected S3 Cloud Bucket Exposed 100GB of Classified NSA Data

Another day another massive trove of sensitive NSA data exposed online – This time, security firm UpGuard’s Cyber Risk team has identified yet another unsecured AWS (Amazon Web Service) S3 cloud storage bucket containing sensitive, confidential data that belongs to the joint command of National Security Agency (NSA) and US Defense Department called the United States […]

Hackers are digging into Microsoft Word flaw that existed for last 17 year

Cybercriminals are successfully exploiting a vulnerability present in Microsoft Office Equation Editor for the past 17 years for distributing malware. It is a backdoor that can provide an attacker full control of the system and allow them the privilege of executing commands and extracting files.  The malware is capable of infecting a system entirely through the powerful […]

Ransomware Attack Involving Scarab Malware Sends Over 12M Emails in 6 Hours

Security researchers at the Austin based Anti-virus software firm Forcepoint have discovered a massive spam ransomware campaign in which the Scarab malware destroys all your files if you don’t pay the ransom, which is asked in Bitcoin. The campaign was started on 23rd November while attackers have used the largest email spam botnet on the […]

Fake Symantec Blog Caught Spreading Proton macOS Malware

In February this year, HackRead published a detailed report on Proton malware which targets macOS. At that time, the malware was being sold on a Dark Web marketplace for 40 BTC ($41,891 at the time of sale). The same malware then showed up last month infecting Mac users who download Elmedia Player. On November 20th, the IT security […]

MS Office’ Default Function Can Be Used to Create Self-Replicating Malware

Italian security researcher Lino Antonio Buono discovered a security flaw that affects almost all versions of Microsoft office. As per the findings of Buono, this vulnerability can let hackers create and distribute macro-based, self-replicating malware and hide it behind unsuspecting MS Word documents. Buono, who works at InTheCyber, explained that a self-replicating malware could allow […]

Tips for Making Your Business Secure from Digital Crimes

Things may be going well for your business and if so great. But there’s always the threat of cybercrime looming over your online ventures. Whether it is to initiate a marketing campaign or to go about day-to-day communications through emails; today every business has an online presence as everything is connected to the internet.  We […]

A banking trojan that steals Gmail, Facebook, Twitter and Yahoo Password

The IT security researchers at Bitdefender have discovered a banking malware that apparently has been developed after keeping the dangerous Zeus trojan in mind. Dubbed Terdot by researchers the trojan was first identified in June 2016. It is capable of injecting visited web pages with HTML code to conduct man-in-the-middle (MitM) attacks and steal banking data including credit card […]

McAfee’s ClickProtect Apparently Infected Devices with Banking Malware

According to a French researcher, the renowned antivirus vendor McAfee sent s file loaded with Emotet banking malware to customers using its anti-hacking service called ClickProtect email protection service. Although Emotet malware was hosted on a third-party website it was shared through a domain that was linked with the project. Ironically, McAfee marketed the anti-hacking […]

Kaspersky Investigators Reveal How NSA Hacking Tools Were Stolen

In its latest report, Kaspersky Lab revealed the findings of its internal investigation, which was launched to dispel the accusations that it has ties with Russian cyberspies and that it helped Russian spies to hack into US’s National Security Agency’s (NSA) contractor’s laptop where Kaspersky’s antivirus was installed. The company initiated a probe into the […]

Amazon Echo and Google Home Devices Vulnerable to BlueBorne Attack

In September 2017, the IT security researchers at Armis found eight zero-day vulnerabilities in Bluetooth protocol. Dubbed BlueBorne by researchers, these vulnerabilities affected millions of IoT and Windows, Linux, iOS and Android-based devices when their Bluetooth was enabled. Although Windows issued a quick patch for the vulnerability, Armis has now discovered that Amazon Echo and Google Home smart speakers […]

Homeland Security Hackers Remotely Hack Boeing 757

For some time now security researchers have talked about critical vulnerabilities present in airplanes, but for the last couple of years, there has been an increase in research work aimed at identifying these vulnerabilities to fix them. Recently, at the 2017 CyberSat Summit on November 8th, Robert Hickey, the program manager at Department of Homeland Security’s Cyber Security […]

New Vulnerability Exploits Antivirus Programs to Install Malware

It is common notion that antivirus software keeps our computers safe from all types of bugs and malware. However, it seems that cybercriminals are hell-bent on changing this belief by using these programs for fulfilling their malicious objectives. As per the findings of Kapsch’s security researcher Florian Bogner, hackers have learned to exploit the Restore […]

Hackers can conduct DoS attacks Using Flaw in Brother Printers

For unsuspecting users, the fact that printers can be used to conduct cyber attacks is difficult to believe but then when a coffee maker can infect devices with ransomware then why not printers. Recently, IT security researchers at Trustwave discovered a critical vulnerability in printers manufactured by Brother Industries, Ltd., a Japanese multinational electronics and electrical equipment company. The vulnerability (CVE-2017-16249) exists in the web front-end of […]

No Prison for Student who Developed Spam Botnet to Pay College Fee

Sean Tiernan, 29 from Santa Clara, California was given 24 months probation on October 30th for his involvement in developing a massive spam botnet that infected more than 77,000 devices to send spam and make money for his college fee. The good news for Tiernan is that he is not facing any prison time for his crime since […]

“Silence” Malware Steals Your Cash Silently

The IT security researchers at Kaspersky Labs have identified that hackers have launched a new campaign against financial organizations where they can access their infrastructure and keep accessing it for an extended period without getting detected to understand the internal processes for stealing cash. Through exploiting the system for a longer duration, hackers can easily detect […]