Browsing tag

malware

Microsoft bug bounty program: $250k for reporting Meltdown & Spectre type flaws

The bug bounty program will remain open until December 31st, 2018. Recently, the identification of serious CPU flaws called Spectre and Meltdown shook the tech community. Although the gravity of damage has been controlled considerably still there is room for mitigation. Perhaps that’s the reason why Microsoft has decided to roll out a new bug bounty […]

Smart home devices can be hacked within minutes through Google search

The Internet of Things (IoT) devices, especially smart home devices, are built to get things done conveniently and to some extent, these devices have been playing a major role in our lives. At the same time, these smart devices are also home to critical security vulnerabilities. Recently, the IT security researchers at the Ben-Gurion University […]

Hackers can steal data from Air-Gapped PCs with microphones & speakers

A research team from Israel’s Ben-Gurion University of the Negev ‘s cybersecurity research center has discovered a new way of data extraction from air-gapped computers via using passive devices like earbuds, earphones, headphones, and speakers. Now, the same research center has claimed to be able to use computer speakers and headphones to act as microphones […]

Hidden For 6 Years, ‘Slingshot’ Malware Hacks Your PC Through Your Router

The researchers at Kaspersky Labs have uncovered a malware, dubbed Slingshot, that has been able to hide for around six years. While the exact number is not known, the malware has infected around 100 users in different countries located in Africa and the Middle East. Slingshot is believed to be active since 2012 through February […]

With New Bankshot Malware Cybercrime Group Hidden Cobra Targets Financial Sectors

Hidden Cobra cybercrime group continues to target multiple industries and financial sectors. With this new aggressive campaign, the group implanted Bankshot malware in Turkish financial system. Bankshot malware last appeared in the year of 2017, it is designed to remain persistent in the victim’s network, also it is capable of searching for hosts that related […]

Powerful APT Malware “Slingshot” Performs Highly Sophisticated Cyber Attack to Compromise Router

Cyber criminals performing a highly sophisticated attack using APT Malware called Slingshot to compromise routers and gain the administrator level access. Slingshot is one of the powerful cyber threat actor that mainly targeting individuals and organization and the major victims belong to Africa and the Middle East. Researchers identified a malicious library function injection technique in the […]

State Spy Programs, espionage & Monero mining – fingers point at Sandvine

Sandvine Products and Technology Used by Egypt, Turkey, and Syrian Governments to Install Spyware and Monero Mining. A Canadian security and human rights research group Citizen Lab has discovered that Turkey, Egypt, and Syrian governments are involved in the hijacking of local internet connections for the purpose of injecting surveillance malware. Moreover, Citizen Lab, run by […]

Cortana Lets Hackers Infect Windows PC Even when it is Locked

The voice commands enabled, multi-language Cortana virtual assistant is probably the most talked about feature that comes with Windows 10 desktop and mobile versions. It performs a number of special functions to help users including opening apps, informing about discount coupons and carrying out basic mathematic calculations. Cortana contained a critical vulnerability From the outlook, […]

Applebee’s restaurants suffered payment card breach

RMH Franchise Holdings revealed on Friday afternoon that PoS (point of sale) systems at the Applebee’s restaurants were infected with a PoS malware. According to information security training specialists, the PoS malware was used to collect names, payment card numbers, expiration dates, and card verification codes. On Friday afternoon, RMH Franchise Holdings published a link to the […]

What to Do When Msvcp140.dll Goes Missing in Windows

Imagine that you download a program or a software that you have been looking for and have been craving to work on for the longest period of time. When you finally get your hands on it and you launch the application after installing it, a dialogue box flashes an in-your-face kind of message with a […]

Hackers Steals Facebook Account Details Using Android Malware

New Android malware discovered that steals Facebook credentials, account details such as username and Passwords and other information directly from users devices. This Malware mainly targeting the Asian Pacific-based English speaking users and it spreading via the third-party market. This new credential stealer contains a lot of aggressive function and malware author using new sophisticated […]

Developer of NanoCore RAT that targeted Canada, US & Steam jailed

The developer of NanoCore RAT (remote access Trojan) has been sentenced to 33 months (2.75 years) in prison for promoting and selling the malware on a popular hacking forum HackForums between 2012 to 2016. The 27-year-old Taylor Huddleston (“Aeonhack” on HackForums) of Hot Springs, Arkansas was arrested in March 2017 and pleaded guilty in July to developing NanoCore malware and admitting that he […]

Wikipedia Page Linked with “Minr” Cryptojacking Malware Infected 3rd Party Website

Cryptojacking Malware called “Minr“ infected website has been linked with Wikipedia Page that leads to mine the cryptocurrency Monero (XMR). Wikipedia visitors who visiting the concern page and once a user clicks the link that pointed to the Malware infected website, the malicious script will be executed and visitor infected with “Minr” crypto-jacking malware. Researchers found that many […]

Tesla cloud resources are hacked to run cryptocurrency-mining malware

Crooks find poorly secured access credentials, use them to install stealth miner. Add Tesla to the legion of organizations that have been infected by cryptocurrency-mining malware. In a report published Tuesday, researchers at security firm RedLock said hackers accessed one of Tesla’s Amazon cloud accounts and used it to run currency-mining software. The researchers said the […]

Flight Sim Lab installed Chrome passwords stealer in piracy check tool

Flight Simulator Lab is caught secretly installing a software which steals Chrome passwords from the browser while checking if the user has installed a pirated copy of their software. Over the years there have been many DRM (Digital rights management) schemes, some of which were quite intriguing but not as much as this one that […]

Free Saturn “Ransomware-as-a-Service” Allows Anyone To Become A Notorious Hacker

Last week, MalwareHunterTeam spotted a new ransomware named Saturn. As per a detailed report from Bleeping Computer, Saturn ransomware is being actively distributed at the moment, but the methods used for its distribution are unknown. Also, this ransomware is not decryptable at the moment. After infecting the machine, Saturn ransomware executes commands to disable Windows […]

Critical Telegram flaw under attack disguised malware as benign images

If you haven’t updated your Windows app lately, now would be a good time. Makers of the Telegram instant messenger have fixed a critical vulnerability that hackers were actively exploiting to install malware on users’ computers, researchers said Tuesday. The flaw, which resided in the Windows version of the messaging app, allowed attackers to disguise […]

‘OLYMPIC DESTROYER’ MALWARE BEHIND WINTER OLYMPICS CYBERATTACK, RESEARCHERS SAY

Winter Olympics officials have confirmed that a cyberattack occurred during the games’ opening ceremony on Feb. 9, but are remaining mum on the source of the attack. Researchers say the attack employed malware, dubbed Olympic Destroyer, that was written with the sole intention of destroying systems, not to steal data. “Maintaining secure operations is our […]

Hospital Hit with Cryptocurrency Mining Malware

Decatur County General Hospital in Parsons, Tennessee, is notifying more than 20,000 individuals that their health information was potentially compromised by an incident last year involving cryptocurrency mining software discovered on an electronic medical records server. The hospital says that on Nov. 27, 2017, it received an information security incident report from its EMR system […]