Browsing tag

Security Hacker

Fin7 Cybercrime Group Hacked Burgerville and Stolen Payment Card Details

The US food chain Burgerville was the recent victim of the notorious Fin7 hacker group. The hackers placed malware on Burgerville’s network and collect the payment card details. Burgerville managed immediately to stop the breach and disable the malware with the help of third-party cybersecurity experts and in cooperation with the FBI. Burgerville Security Breach […]

New DanaBot Banking Malware Attack in Various Countries with Stealer and Remote Access Futures

New Banking malware called “DanaBot” actively attacking various counties organization with sophisticated evasion technique and act as a Stealer and ability to gain remote access from targeted victims machine. DanaBot content some evasion technique such as extensive anti-analysis features and targeting various countries including Poland, Italy, Germany, and Austria, Australia and mainly targeting organization in the […]

Most Advanced Backdoor Obfuscation and Evasion Technique That used by Hackers

Cybercriminals are using the most sophisticated techniques to bypass the security controls in various organization such as  IT, medical, manufacturing industries, energy sectors, even government entities. Sometimes developers are creating a backdoor for a legitimate purpose such as maintenance and easy accessibility during the technical issue via a remote location. But the hackers are using it […]

Dark Web Malware Builder Allow Attackers To Create Malware That Steals Passwords & Credit Card Data

Researchers from Checkpoint spotted a free online builder for building customized binaries for the popular info-stealer Azorult malware that steals user passwords, credit card information, cryptocurrency related data. The Gazop service emerged as a result of the source code leak of Azorult’s panel version 3.1 and 3,2. the free Gazorp service allows threat actors to fresh […]

Torii Botnet – A New Sophisticated IoT Botnet Attack in Wide – More Powerful Than Mirai

Most Sophisticated Torii Botnet discovered that spreading with more advanced techniques than famous Mirai Botnet but different than Mirai functionality. Malware Authors developed Torii botnet with more stealthy and persistence capabilities unlike other botnets it doesn’t perform attacks such as DDOS or other attacks such take down the connected devices. But this will compromise the victim’s […]

$60 Million Worth Cryptocurrencies Stolen Hackers From Japanese Cryptocurrency Exchange

Hackers stolen cryptocurrencies worth $60 million form Japanese cryptocurrency exchange firm Zaif exchange hot wallet that connected to the internet. The stolen cryptocurrencies include Bitcoin, Monacoin and Bitcoin Cash, the attackers gained control over Zaif exchange hot wallet for two hours and transferred the funds. Tech Bureau group who owns Zaif said that bout 2.2 […]

Most Important USB Memory Sticks based Cyber Attack Mitigation Steps for Your Organization

Among the ten major cyber threats identified by BSI in 2016, the use of portable peripheral devices ranks second. While the same agency suggests engaging in countermeasures aimed at implementing targeted procedures based on your organization’s specific structure, there seems to be no reason why companies cannot securely store their data on USB Memory Sticks. By combining preventative […]

Wannamine Malware Still Penetrate the Unpatched SMB Computers using NSA’s EternalBlue Exploit

Cryptomining based Wannamine malware outbreak still actively attacking the windows users around the globe that using NSA exploit Eternalblue to penetrate the unpatched SMB enabled computers to gain high privileged access. Eternalblue Exploit leaked from NSA last year that made a huge impact around the world by exploiting the SMB flow and that leads to massive WannaCry and NotPetya attacks. Many […]

Veeam Publicly Exposed 445 Million Customers Records Of its Marketing Database

Data Management Company’s misconfigured MongoDB server exposed its marketing database that contains around 445 million its customer records. Veeam, a company that develops backup, disaster recovery and intelligent data management software for virtual, physical and cloud-based infrastructures. Exposed data contains more than 200 gigabytes of customer records, mostly names, email addresses, and in some cases IP addresses. All […]

Malware-as-a-Service – New Black Rose Lucy Malware Targets Android Devices With a Special Logic for Xiaomi Phones

Malware-as-a-Service(MaaS) is a practice in which the attackers puts the malware for sale allows anyone with little technical knowledge can launch an attack. Checkpoint research team uncovered the new MaaS product, Black Rose Lucy, developed by Russian speaking team dubbed The Lucy Gang. The MaaS bundle contains a Lucy Loader which is used to remote […]

Best Way to Find the Stolen Android Phones with the Help of Google

One of the most devastating feelings in the world is your phone being stolen. In the past, there was no phone tracker, and once your phone got stolen, it would have remained a history. The evolvement of technology has made it super easy to be able to locate your phone. It always becomes easy to […]

New PyLocky Ransomware Attack on Various Organization that Encrypt More than 100 File Extensions

Newly spreading PyLocky Ransomware widely targeting and attack various organization by evading the security solutions using its sophisticated attack functionality and its activities keep increasing since the last August. PyLocky mainly targeting European countries, particularly France, Germany and it trying to  compromise the business units to demand the ransom amount. PyLocky ransomware written in python […]

UK Teen Finally Arrested for DDoS Attack on ProtonMail Behalf of Russian Hackers Group

National Crime Agency (NCA) from the UK finally arrested the Teen for a heavy DDoS attack on ProtonMail email service. 19-year-old Teen George Duke-Cohan who was roaming on the internet under the name ‘7R1D3N7′, ‘DoubleParalla’ and ‘optcz1′, was launched a heavy DDoS attack on ProtonMail. In this case, Protonmail faced a DDoS Attack on their network daily basis […]

New CHAINSHOT Malware Attack Carried Adobe Flash 0-day Exploit with Weaponized Microsoft Excel Documents

Newly discovered CHAINSHOT Malware attack using Adobe Flash 0-day vulnerability that carried by several Weaponized documents along with the encrypted malware payload. Researchers successfully cracked the 512-bit RSA key and decrypted the payload also the attack contains the several steps that follow each and every steps input. Attackers using the new toolkit that performed as […]

British Airways Hacked – More than 380,000 Payment Cards Compromised

British Airways Hacked, customers who made the booking through the website or mobile app from August 21, 2018, to September 5, 2018, are affected. The attackers stole personal and financial details of 380,000 customers who made the booking through the website ba.com and mobile app. British Airways confirmed that travel details, passport details, and stored […]

Mobile Spyware Maker mSpy Leaked Millions of Sensitive Data Online in Plain Text

A leading mobile spyware maker mSpy leaked more than a million paying customers including kids and partners high sensitive data online. mSpy is a brand of mobile and computer parental control monitoring software for iOS,  Android, Windows, and macOS. mSpy monitors and logs user activity on the client device. Leaked data contains millions of users including passwords, call logs, text messages, […]