Menu

Blog

Archive for the ‘cybercrime/malcode’ category: Page 20

May 10, 2024

Dell Confirms Database Hacked—Hacker Says 49 Million Customers Hit

Posted by in category: cybercrime/malcode

Computer hardware giant Dell is sending emails alerting customers to a data breach that, according to a Dark Web hacker forum sales post, impacts 49 million users.

May 6, 2024

New ‘Cuckoo’ Persistent macOS Spyware Targeting Intel and Arm Macs

Posted by in category: cybercrime/malcode

A new malware called “Cuckoo” is on the loose, targeting both Intel and ARM-based Macs.

May 6, 2024

Hackers Increasingly Abusing Microsoft Graph API for Stealthy Malware Communications

Posted by in category: cybercrime/malcode

Nation-state hackers have a new trick — turning Microsoft’s own cloud services into secret command centers to launch attacks undetected.

May 3, 2024

Malicious Android Backdoor Lets Hackers Steal Your Phone’s Content

Posted by in categories: cybercrime/malcode, mobile phones

Don’t let this dangerous malware onto your phone.

May 3, 2024

Android malware posing as a fake Chrome update is stealing banking app logins

Posted by in categories: cybercrime/malcode, finance, mobile phones

Some online scams are more conspicuous than others, but the most insidious can be especially tricky to spot. For instance, last week, cybersecurity firm ThreatFabric uncovered a new Android malware family that cleverly disguises itself as a Google Chrome update. Before you click a link claiming to provide updates for Chrome, be sure that it isn’t fake.

ThreatFabric analysts found the malware — which they dubbed Brokewell — on a fake browser update page designed to fool people into downloading a malicious app. If the page manages to fool you, you’ll end up downloading seriously dangerous malware.

May 1, 2024

Collection agency data breach affects millions of users

Posted by in categories: business, cybercrime/malcode, finance

An American debt collection agency suffered a data breach in late February, losing sensitive data belonging to almost two million people.

Earlier this week, Financial Business and Consumer Solutions (FBCS) sent a data breach notification letter to affected customers, explaining that unauthorized third parties accessed its systems on February 14, 2024, and remained there until being spotted, and ousted, on February 26.

Apr 29, 2024

Account compromise of “unprecedented scale” uses everyday home devices

Posted by in category: cybercrime/malcode

Authentication service Okta is warning about the “unprecedented scale” of an ongoing campaign that routes fraudulent login requests through the mobile devices and browsers of everyday users in an attempt to conceal the malicious behavior.

The attack, Okta said, uses other means to camouflage the login attempts as well, including the TOR network and so-called proxy services from providers such as NSOCKS, Luminati, and DataImpulse, which can also harness users’ devices without their knowledge. In some cases, the affected mobile devices are running malicious apps. In other cases, users have enrolled their devices in proxy services in exchange for various incentives.

Unidentified adversaries then use these devices in credential-stuffing attacks, which use large lists of login credentials obtained from previous data breaches in an attempt to access online accounts. Because the requests come from IP addresses and devices with good reputations, network security devices don’t give them the same level of scrutiny as logins from virtual private servers (VPS) that come from hosting services threat actors have used for years.

Apr 29, 2024

Billion-Dollar Bank Facing Class Action Compliant After Data Breach Exposes Customers’ Names, Social Security Numbers and Other Sensitive Information

Posted by in categories: cybercrime/malcode, finance

A US bank is facing a proposed class action lawsuit for allegedly failing to protect its customers’ sensitive personal information and suffering a massive data breach.

SouthState Bank, which has over $45 billion in assets, is being hit with a class action lawsuit led by plaintiff Latonya Gore in Florida, filings show.

The suit concerns a February 2024 data breach that compromised the banks’ clients’ full names, financial account numbers and Social Security numbers.

Apr 29, 2024

Millions of devices still vulnerable to abandoned USB worm, continues to spread globally

Posted by in category: cybercrime/malcode

Security researchers have uncovered a chilling global epidemic: an old malware that has been spreading uncontrollably for years. Despite its creators seemingly abandoning the project years ago, this insidious USB worm has lived on, potentially infecting millions of new machines around the world.

The worm, which first hit the scene in 2019 as a new variant of the infamous PlugX malware, had a devious trick up its sleeve. It could automatically copy itself onto any USB drive connected to an infected machine, allowing it to hitch a ride and infect new computers without any user interaction required.

But at some point, the hackers abandoned the malware’s command-and-control server, essentially cutting off their ability to oversee the infected machines. One might assume this would be the end of the line for the pesky worm, but that was not the case.

Apr 28, 2024

Expert-Defying Anomaly — Scientists Discover 2D Nanomaterial With Counter-Intuitive Expanding Properties

Posted by in categories: chemistry, cybercrime/malcode, nanotechnology, particle physics

It is a common hack to stretch a balloon out to make it easier to inflate. When the balloon stretches, the width crosswise shrinks to the size of a string. Noah Stocek, a PhD student collaborating with Western University physicist Giovanni Fanchini, has developed a new nanomaterial that demonstrates the opposite of this phenomenon.

Working at Interface Science Western, home of the Tandetron Accelerator Facility, Stocek, and Fanchini formulated two-dimensional nanosheets of tungsten semi-carbide (or W2C, a chemical compound containing equal parts of tungsten and carbon atoms) which when stretched in one direction, expand perpendicular to the applied force. This structural design is known as auxetics.

Page 20 of 222First1718192021222324Last