Menu

Blog

Archive for the ‘cybercrime/malcode’ category

Jan 15, 2025

Microsoft Uncovers macOS Vulnerability CVE-2024–44243 Allowing Rootkit Installation

Posted by in categories: cybercrime/malcode, mobile phones

Microsoft has shed light on a now-patched security flaw impacting Apple macOS that, if successfully exploited, could have allowed an attacker running as “root” to bypass the operating system’s System Integrity Protection (SIP) and install malicious kernel drivers by loading third-party kernel extensions.

The vulnerability in question is CVE-2024–44243 (CVSS score: 5.5), a medium-severity bug that was addressed by Apple as part of macOS Sequoia 15.2 released last month. The iPhone maker described it as a “configuration issue” that could permit a malicious app to modify protected parts of the file system.

“Bypassing SIP could lead to serious consequences, such as increasing the potential for attackers and malware authors to successfully install rootkits, create persistent malware, bypass Transparency, Consent and Control (TCC), and expand the attack surface for additional techniques and exploits,” Jonathan Bar Or of the Microsoft Threat Intelligence team said.

Jan 15, 2025

WP3.XYZ malware attacks add rogue admins to 5,000+ WordPress sites

Posted by in category: cybercrime/malcode

A new malware campaign has compromised more than 5,000 WordPress sites to create admin accounts, install a malicious plugin, and steal data.

Researchers at webscript security company c/side discovered during an incident response engagement for one of their clients that the malicious activity uses the wp3[.]xyz domain to exfiltrate data but have yet to determine the initial infection vector.

After compromising a target, a malicious script loaded from the wp3[.]xyz domain creates the rogue admin account wpx_admin with credentials available in the code.

Jan 13, 2025

How AI will transform cybersecurity in 2025 — and supercharge cybercrime

Posted by in categories: cybercrime/malcode, robotics/AI

From AI-driven defense to evolving ransomware tactics, here’s what cybersecurity industry leaders and experts are preparing for this year.

Jan 12, 2025

Chinese hackers target US Treasury computers used for sanctions — Committee on Foreign Investment specifically targeted

Posted by in category: cybercrime/malcode

No secret information was stolen.

Jan 11, 2025

Innovation, Automation, And The Cybersecurity Challenges Ahead

Posted by in categories: cybercrime/malcode, robotics/AI

The rapid evolution of artificial intelligence is transforming cybersecurity, offering unprecedented opportunities to defend against increasingly complex and automated threats. AI is no longer a support tool—it’s emerging as a central pillar of modern security strategies. From detecting anomalies and automating threat responses to augmenting security teams, AI is enabling defenders to act faster, scale their operations, and outpace attackers. However, as the technology advances, significant challenges remain, from adversarial AI to the cultural inertia of legacy systems.

Tomer Weingarten, CEO of SentinelOne, and Richard Stiennon, research analyst with IT-Harvest and author of Security Yearbook 2024, both highlight the potential—and limitations—of AI in cybersecurity. “It’s very early days for AI in security,” says Stiennon. “I have found 84 startups with various AI agents or which hope to deploy guardrails to protect companies from mishandling of data by users of AI. It’s way too early to say that any of them are having an impact on the ecosystem. That said, the future is clear. AI will be part of every cyber defense position.”

Weingarten echoes this sentiment, noting that AI’s role is rapidly expanding but far from mature. “AI is no longer just about supporting cybersecurity—it’s fundamentally changing how we secure systems, anticipate threats, and automate responses,” he explains.

Jan 9, 2025

Mirai Botnet Variant Exploits Four-Faith Router Vulnerability for DDoS Attacks

Posted by in category: cybercrime/malcode

A Mirai botnet variant has been found exploiting a newly disclosed security flaw impacting Four-Faith industrial routers since early November 2024 with the goal of conducting distributed denial-of-service (DDoS) attacks.

The botnet maintains approximately 15,000 daily active IP addresses, with the infections primarily scattered across China, Iran, Russia, Turkey, and the United States.

Exploiting an arsenal of over 20 known security vulnerabilities and weak Telnet credentials for initial access, the malware is known to have been active since February 2024. The botnet has been dubbed “gayfemboy” in reference to the offensive term present in the source code.

Jan 9, 2025

Researchers Expose NonEuclid RAT Using UAC Bypass and AMSI Evasion Techniques

Posted by in category: cybercrime/malcode

NonEuclid RAT: C# malware offering remote access, antivirus bypass, and ransomware, active since November 2024.

Jan 9, 2025

Neglected Domains Used in Malspam to Evade SPF and DMARC Security Protections

Posted by in categories: cybercrime/malcode, policy

Cybersecurity researchers have found that bad actors are continuing to have success by spoofing sender email addresses as part of various malspam campaigns.

Faking the sender address of an email is widely seen as an attempt to make the digital missive more legitimate and get past security mechanisms that could otherwise flag it as malicious.

While there are safeguards such as DomainKeys Identified Mail (DKIM), Domain-based Message Authentication, Reporting and Conformance (DMARC), and Sender Policy Framework (SPF) that can be used to prevent spammers from spoofing well-known domains, such measures have increasingly led them to leverage old, neglected domains in their operations.

Jan 8, 2025

New EAGERBEE Variant Targets ISPs and Governments with Advanced Backdoor Capabilities

Posted by in categories: cybercrime/malcode, evolution, internet

Internet service providers (ISPs) and governmental entities in the Middle East have been targeted using an updated variant of the EAGERBEE malware framework.

The new variant of EAGERBEE (aka Thumtais) comes fitted with various components that allow the backdoor to deploy additional payloads, enumerate file systems, and execute commands shells, demonstrating a significant evolution.

“The key plugins can be categorized in terms of their functionality into the following groups: Plugin Orchestrator, File System Manipulation, Remote Access Manager, Process Exploration, Network Connection Listing, and Service Management,” Kaspersky researchers Saurabh Sharma and Vasily Berdnikov said in an analysis.

Jan 8, 2025

CISA: No Wider Federal Impact from Treasury Cyber Attack, Investigation Ongoing

Posted by in category: cybercrime/malcode

Chinese hackers exploited BeyondTrust API keys in a major Treasury cyberattack; CISA confirms no wider federal impact.

Page 1 of 22612345678Last