Archive for the ‘cybercrime/malcode’ category: Page 26
Feb 17, 2024
China worries less about US cyberattacks, but frets over India
Posted by Gemechu Taye in categories: cybercrime/malcode, government, military
According to a Chinese security expert, a significant number of attacks actually originate from countries in South Asia.
One India-based group of hackers, known as ‘Bitter’, has used various methods to target government, military and nuclear sectors.
Feb 17, 2024
Microsoft, OpenAI reveal state-sponsored cybercrime tactics using AI
Posted by Gemechu Taye in categories: cybercrime/malcode, robotics/AI
The fourth group is Curium, an Iranian group that has used LLMs to generate phishing emails and code to evade antivirus detection. Chinese state-affiliated hackers have also used LLMs for research, scripting, translations, and refining their tools.
Fight AI with AI
Microsoft and OpenAI say they have not detected any significant attacks using LLMs yet, but they have been shutting down all accounts and assets associated with these groups. “At the same time, we feel this is important research to publish to expose early-stage, incremental moves that we observe well-known threat actors attempting, and share information on how we are blocking and countering them with the defender community,” says Microsoft.
Feb 16, 2024
Cybergang DarkGate Uses CAPTCHA to Spread Malware
Posted by Shubham Ghosh Roy in categories: cybercrime/malcode, law
This post is also available in: עברית (Hebrew)
HP Wolf Security’s latest threat insights disclosure put a spotlight on DarkGate – a group of web-based criminals using legal advertising tools to enhance their spam-based malware attacks.
The security report claims DarkGate has been operating as a malware provider since 2018, with an apparent shift in tactics last year of using legitimate advertisement networks “to track victims and evade detection.” The claims are that by using ad services, threat actors can analyze which lures generate clicks and infect the most users – helping them refine campaigns for maximum impact.
Feb 14, 2024
DarkMe Malware Targets Traders Using Microsoft SmartScreen Zero-Day Vulnerability
Posted by Shubham Ghosh Roy in categories: cybercrime/malcode, finance
Hackers are exploiting a ZERO-DAY flaw in Microsoft Defender SmartScreen to deliver DarkMe malware. This sophisticated attack can steal your data and give hackers access to your financial accounts.
Feb 13, 2024
PikaBot Resurfaces with Streamlined Code and Deceptive Tactics
Posted by Shubham Ghosh Roy in category: cybercrime/malcode
The threat actors behind the PikaBot malware have made significant changes to the malware in what has been described as a case of “devolution.”
“Although it appears to be in a new development cycle and testing phase, the developers have reduced the complexity of the code by removing advanced obfuscation techniques and changing the network communications,” Zscaler ThreatLabz researcher Nikolaos Pantazopoulos said.
PikaBot, first documented by the cybersecurity firm in May 2023, is a malware loader and a backdoor that can execute commands and inject payloads from a command-and-control (C2) server as well as allow the attacker to control the infected host.
Feb 11, 2024
Hackers Steal $25 Million by Deepfaking Finance Boss
Posted by Shubham Ghosh Roy in categories: cybercrime/malcode, finance
A multinational company was scammed out of $25.6 million by hackers who fooled employees at the company’s Hong Kong branch into believing their digital recreation of its chief financial officer — as well as several other video conference participants — were real.
The hack, believed to be the first of its kind, highlights just how far deepfake technology has progressed.
As the South China Morning Post reports, scammers are believed to have used publicly available footage to create deepfake representations of the staff. Some of the fake video calls apparently only had a single human on the line, with the rest being deepfakes created by the hackers.
Feb 11, 2024
PenTest: Threat Hunting and Malware Analysis Case Studies
Posted by Shubham Ghosh Roy in category: cybercrime/malcode
Download FilePT07:21_Threat_Hunting_Malware_Analysis_OPEN.pdf Please login or Register to access downloadables Download This magazine is free to download, just register as a free user and enjoy your reading!
Feb 9, 2024
Raspberry Robin Malware Upgrades with Discord Spread and New Exploits
Posted by Shubham Ghosh Roy in category: cybercrime/malcode
The operators of Raspberry Robin are now using two new one-day exploits to achieve local privilege escalation, even as the malware continues to be refined and improved to make it stealthier than before.
This means that “Raspberry Robin has access to an exploit seller or its authors develop the exploits themselves in a short period of time,” Check Point said in a report this week.
Raspberry Robin (aka QNAP worm), first documented in 2021, is an evasive malware family that’s known to act as one of the top initial access facilitators for other malicious payloads, including ransomware.
Feb 8, 2024
Patchwork Using Romance Scam Lures to Infect Android Devices with VajraSpy Malware
Posted by Shubham Ghosh Roy in categories: cybercrime/malcode, robotics/AI
Threat actor “Patchwork” uses romance scams to spread espionage apps in India and Pakistan! Learn how they infiltrated Android devices with VajraSpy.