БЛОГ

Archive for the ‘cybercrime/malcode’ category: Page 53

Apr 7, 2023

Cacti, Realtek, and IBM Aspera Faspex Vulnerabilities Under Active Exploitation

Posted by in category: cybercrime/malcode

Critical security flaws in Cacti, Realtek, and IBM Aspera Faspex are being exploited by various threat actors in hacks targeting unpatched systems.

This entails the abuse of CVE-2022–46169 (CVSS score: 9.8) and CVE-2021–35394 (CVSS score: 9.8) to deliver MooBot and ShellBot (aka PerlBot), Fortinet FortiGuard Labs said in a report published this week.

CVE-2022–46169 relates to a critical authentication bypass and command injection flaw in Cacti servers that allows an unauthenticated user to execute arbitrary code. CVE-2021–35394 also concerns an arbitrary command injection vulnerability impacting the Realtek Jungle SDK that was patched in 2021.

Apr 6, 2023

CryptoClippy: New Clipper Malware Targeting Portuguese Cryptocurrency Users

Posted by in categories: cryptocurrencies, cybercrime/malcode

New CryptoClippy malware steals cryptocurrency by replacing wallet addresses during transactions.

Apr 6, 2023

Typhon Reborn Stealer Malware Resurfaces with Advanced Evasion Techniques

Posted by in category: cybercrime/malcode

Besides incorporating more anti-analysis and anti-virtualization checks, Typhon Reborn V2 removes its persistence features, instead opting to terminate itself after exfiltrating the data.

The malware ultimately transmits the collected data in a compressed archive via HTTPS using the Telegram API, marking continued abuse of the messaging platform.

“Once the data has been successfully transmitted to the attacker, the archive is then deleted from the infected system,” Brumaghin said. “The malware then calls to terminate execution.”

Apr 6, 2023

Rorschach Ransomware Emerges: Experts Warn of Advanced Evasion Strategies

Posted by in categories: cybercrime/malcode, encryption

Cybersecurity researchers have taken the wraps off a previously undocumented ransomware strain called Rorschach that’s both sophisticated and fast.

“What makes Rorschach stand out from other ransomware strains is its high level of customization and its technically unique features that have not been seen before in ransomware,” Check Point Research said in a new report. “In fact, Rorschach is one of the fastest ransomware strains ever observed, in terms of the speed of its encryption.”

The cybersecurity firm said it observed the ransomware deployed against an unnamed U.S.-based company, adding it found no branding or overlaps that connect it to any previously known ransomware actors.

Apr 5, 2023

I literally connected my brain to GPT-4 with JavaScript

Posted by in categories: cybercrime/malcode, robotics/AI

I hacked my brain with a compact electroencephalogram (EEG) and connected it to GPT-4 with the OpenAI API. In this crazy tutorial, you’ll learn how to use JavaScript to read your brainwaves.

#tech #javascript #science.

Continue reading “I literally connected my brain to GPT-4 with JavaScript” »

Apr 2, 2023

Trojanized Tor browsers target Russians with crypto-stealing malware

Posted by in categories: cryptocurrencies, cybercrime/malcode

A surge of trojanized Tor Browser installers targets Russians and Eastern Europeans with clipboard-hijacking malware that steals infected users’ cryptocurrency transactions.

Kaspersky analysts warn that while this attack is not new or particularly creative, it’s still effective and prevalent, infecting many users worldwide.

While these malicious Tor installers target countries worldwide, Kaspersky says that most are targeting Russia and Eastern Europe.

Mar 31, 2023

D3dcompiler_47.dll: If AV raises an alerts about this Microsoft signed dll file, you are in trouble

Posted by in categories: cybercrime/malcode, encryption, internet

Threat actors used a well-liked piece of corporate communication software from 3CX, according to security experts. In particular, reports state that a desktop client for the 3CX VoIP (Voice over Internet Protocol) service was used to specifically target 3CX’s clients.

It is believed that the attack is a multi-part process, with the first stage using a hacked version of the 3CX desktop application. Although the.exe file and the MSI package have the same name, preliminary research indicates that the MSI package is the one that may include DLLs that have been maliciously modified.

Continue reading “D3dcompiler_47.dll: If AV raises an alerts about this Microsoft signed dll file, you are in trouble” »

Mar 31, 2023

600,000 companies networks using 3CX VoIP software infected with malware. Biggest supply chain attack

Posted by in categories: cybercrime/malcode, government

Researchers from multiple security companies have reported that a massive supply chain attack on users of 3CX, a widely utilized voice and video calling desktop client, was carried out by computer hackers working on behalf of the government of North Korea. The attack targeted users of the Windows and macOS operating systems. 3CX users may make calls, examine the status of colleagues, chat, plan a video conference, and check voicemails all from the desktop program by using the 3CXDesktopApp, which is accessible for Windows, macOS, Linux, and mobile devices.

The attack resulted in the compromising of the software build system that was used to generate and distribute versions of the app for Windows and macOS. The app delivers VoIP and PBX services to “over 600,000 clients,” some of which include American Express, Mercedes-Benz, and Price Waterhouse Cooper. Since the attackers controlled the software development system, they were able to insert malware into 3CX applications, even though those applications had been digitally signed using the official signing key for the firm.

Continue reading “600,000 companies networks using 3CX VoIP software infected with malware. Biggest supply chain attack” »

Mar 31, 2023

Powered by GPT-4: Microsoft’s new AI Security Copilot to enhance cybersecurity

Posted by in categories: cybercrime/malcode, robotics/AI

According to Microsoft, 1,287 password attacks occur every second around the world.

Microsoft is now focusing on cybersecurity as part of its ongoing efforts to incorporate generative artificial intelligence into the majority of its products. The company previously announced an AI-powered assistant for Office apps.

To enhance cyber security, Microsoft Corp has announced the implementation of the next generation of AI in its security products.

Continue reading “Powered by GPT-4: Microsoft’s new AI Security Copilot to enhance cybersecurity” »

Mar 31, 2023

Supply chain cyberattack with possible links to North Korea could have thousands of victims globally

Posted by in category: cybercrime/malcode

Hackers modified an enterprise communication company’s installation software in an attack that could steal credentials and other information from companies around the world, according to an analysis published Wednesday.

Researchers with cybersecurity firm SentinelOne’s SentinelLabs team traced illicit activity flagged by its detection systems back to the installation software from a company called 3CX, which according to its website provides video conferencing and online communication products to companies such as Toyota, McDonalds, Pepsi and Chevron. In total, the company says it serves some 12 million customers globally.

This sort of large-scale attack that takes advantage of a company’s supply chain — similar to how attackers leveraged a flaw within a SolarWinds product update to install backdoors inside its customers’ networks — can be difficult to defend against and could lead to devastating consequences for victims. It’s also the kind of operation that is typically associated with a nation-state hacking group.

Page 53 of 219First5051525354555657Last