Browsing tag

malware

Hackers Launching Unique Windows and MacOS Malware via Fake WhatsApp Official Website

Researchers discovered a new malware that infect MacOS via malicious website by disguised as WhatsApp official website where it also drops a malware for Windows Operating system. Attackers are targeting both Windows and MacOS operating system to injecting a backdoor that helps to execute malicious code from a remote server. Backdoor named as Mac.BackDoor.Siggen.20 gets on […]

RCE Bug in Microsoft RDP Protocol Let Hackers Perform WannaCry Level Attack on 3 Million Vulnerable Endpoints

A critical remote execution vulnerability in Microsoft remote desktop services enables let attackers compromise the vulnerable system with WannaCry level malware. Microsoft recently fixed this RCE vulnerability in Remote Desktop Services – formerly known as Terminal Services, and it’s affected some of the old version of Windows. A WannaCry attack was one of the notorious […]

Laptop Running Six Most Dangerous Malware up for Auction

This is news! A laptop containing six of the most dangerous of malware created till date is up for auction. A Samsung NC10-14GB 10.2-Inch Blue Netbook, which contains six such malware strains which together have caused damages worth $95B over the years, has been put up for auction. This laptop has in fact been isolated and […]

Hackers Distribute PLEAD Malware through Supply-chain and man-in-the-middle Attack

Security researchers a new malware campaign that delivers Plead malware by abusing legitimate software that developed by ASUS Cloud Corporation. The PLEAD malware found to be active since 2012, and the executables are signed with the stolen certificate. The new campaign executed through a legitimate process named AsusWSPanel.exe, which is the windows client for ASUS […]

Trend Micro is one of the anti-virus firms hacked by Fxsmsp

Other two companies allegedly involved in the data breach are Symantec and McAfee. Recently Hackread.com informed you about a Russian group of hackers dubbed Fxsmsp that is specifically targeting trusted anti-virus companies and has attacked the servers of three mainstream firms. Now, Gizmodo has reported that Trend Micro is included in the list of the […]

Are APT Campaigns Funded By Iran Intensifying?

There are two types of APT (Advanced Persistent Threats), the first one is self-funded by the cybercriminal organizations themselves, the other one being funded by state-actors. State-actors are representatives of nation-states, with the goals aligned with the states they are associated with. The publicly accessible Internet is not only the source of news, entertainment, communication […]

Phishing Attacks Mostly Impersonate Microsoft, Netflix & PayPal Accounts

Phishing attacks are evolving in their approach. The latest report from Vade Secure concludes that big consumer software companies like Microsoft, Netflix, and Payal were impersonated by hackers to carry out the most phishing attacks. Phishing attacks in 2018 utilized social engineering to steal people’s credentials. The steps involved in phishing attacks remain the same. […]

Malware affects users of tax payment software Wolters Kluwer

Website security audit specialists reported a malware infection at Wolters Kluwer, a widely used accounting and tax payment software platform; this incident has made it impossible for users to work with this software. In addition, there is concern about the state of security of tax returns and other financial details stored in the company’s cloud.   […]

Chinese hackers accessed NSA hacking tools before Shadow Brokers leak

Chinese hackers then used NSA’s hacking tools and technology to target American allies. Symantec researchers have discovered that in 2016, Chinese intelligence managed to repurpose hacking tools used by the National Security Agency (NSA) and exploit them to attack American private firms and allies across the globe. In the new report published by The New […]

Hackers Use GitHub to Host Malware to Attack Victims by Abusing Yandex Owned Legitimate ad Service

Threat actors distribute malware by posting malicious ads that redirect users to the websites that offering malicious downloads disguised as document templates. The hacker group abused Yandex.Direct, an online advertising network to post the malvertising campaign and the malware hosted on GitHub. According to ESET Research team report, the campaign distributes the well-known Buhtrap and […]

‘Sodinokibi’ Is A New Ransomware That Exploits Oracle Zero Day Flaw

A couple of weeks back, a zero-day vulnerability was discovered in Oracle WebLogic Servers that can trigger the deserialization of malicious code and allow hackers to take over the targeted system. Now, a recent report suggests that this zero-day vulnerability has been abused for over a week to infect Oracle WebLogic servers through ransomware. So far, two […]

Kodi Hardware Add-on Users, Mostly At Risk With Malware

Kodi used to be a software-only solution that provides a user seeking to share media in a certain geographic area seamless, but the people behind the software went ahead and supplied their patrons with hardware version. This lessened the need for someone to have the technical expertise in setting up a separate PC for media […]

Puma Australia Hit With Credit Card Hack Malware

Sophisticated malware was planted by hackers on Puma Australia’s website, with the intention to steal customer’s credit card information at checkout, a security researcher found. A suspicious code tucked away on Puma Australia’s page containing a script that logged people’s credit card numbers, names, and addresses when they typed them in on the website. The […]

New way to detect the malware hidden in hardware

While detecting malicious software hidden in hardware parts is an incredibly complex task, cyber forensics course specialists believe that important steps are being taken to address this attack vector. Recently, threat actors have refined their methods to hide malware within the firmware of hard disks, graphics cards, motherboards and other commonly used components for the […]

Hackers targeting embassies with trojanized version of TeamViewer

Researchers believe the trojanized version of TeamViewer is being spread by a Russian speaking hacker. The latest report from Check Point reveals that multiple embassies in Europe were targeted with a trojanized version of TeamViewer. The embassies affected in the latest wave of attacks include Nepal, Lebanon, Italy, Kenya, Liberia, Guyana, and Bermuda. According to […]

Hackers Abusing Digitally Signed Emails to Launch JasperLoader Malware Via Weaponized Word Document

Security researchers tracked a new malware loader JasperLoader, which has been active for the last few months and distributed through digitally signed emails. The campaign primarily targets European countries, it employs a multi-stage infection process with a number of obfuscation techniques, which make the analysis process more complicated. “Over the past several months, we’ve seen […]