Menu

Blog

Archive for the ‘cybercrime/malcode’ category: Page 38

Jan 2, 2023

What is the War in Ukraine Teaching Us About Our Reliance on Power Grids?

Posted by in categories: cybercrime/malcode, education, energy

Russia has focused its aerial attack on destroying Ukraine’s energy grid. Are all countries with national grids vulnerable to this type of assault?


National grids are not just vulnerable to third-party cyberattacks. In war, if the grid is targeted, it can be a country’s Achilles’ heel.

Jan 2, 2023

North Korean hackers are posing as VC firms to steal crypto — and a blockchain expert says 2023 could bring more cyberattacks than ever

Posted by in categories: blockchains, cryptocurrencies, cybercrime/malcode, finance

North Korea’s infamous Lazarus Group is mimicking venture capital firms and banks to steal cryptocurrency, according to a report from cybersecurity company Kaspersky.

The state-sponsored cybercrime group, which was was behind the $625 million Axie Infinity hack in April, is creating domains that present themselves as well-known Japanese, US and Vietnamese companies.

Kaspersky said Lazarus’ BlueNoroff subgroup is using new types of malware delivery methods that bypass security warnings about downloading content. They can then “intercept large cryptocurrency transfers, changing the recipient’s address, and pushing the transfer amount to the limit, essentially draining the account in a single transaction.”

Jan 1, 2023

“I thought I’d been hacked. It turned out I’d been fired”: tales of a Twitter engineer

Posted by in category: cybercrime/malcode

Seven wild months at Musk’s company | 1,843 magazine.

Dec 30, 2022

Researcher Uncovers Potential Wiretapping Bugs in Google Home Smart Speakers

Posted by in categories: cybercrime/malcode, internet

A security researcher was awarded a bug bounty of $107,500 for identifying security issues in Google Home smart speakers that could be exploited to install backdoors and turn them into wiretapping devices.

The flaws “allowed an attacker within wireless proximity to install a ‘backdoor’ account on the device, enabling them to send commands to it remotely over the internet, access its microphone feed, and make arbitrary HTTP requests within the victim’s LAN,” the researcher, who goes by the name Matt, disclosed in a technical write-up published this week.

In making such malicious requests, not only could the Wi-Fi password get exposed, but also provide the adversary direct access to other devices connected to the same network. Following responsible disclosure on January 8, 2021, the issues were remediated by Google in April 2021.

Dec 27, 2022

NASA Sets Table for Safe Air Taxi Flights

Posted by in categories: cybercrime/malcode, military

Tabletop exercises allow researchers to explore options and test scenarios in fields from military strategy and cybersecurity to disaster response planning.

Dec 27, 2022

Perception vs reality: How to really prepare for ransomware

Posted by in category: cybercrime/malcode

Check out all the on-demand sessions from the Intelligent Security Summit here.

It appears that most IT environments have not connected the dots when it comes to ransomware and the importance of a good protection system. It’s easy to infer this when reading a recent IDC survey of more than 500 CIOs from 20-plus industries around the world.

The most headline-grabbing statistic from IDC’s report is that 46% of respondents were successfully attacked by ransomware in the last three years. That means that ransomware has leaped past natural disasters to become the primary reason one must be good at performing large data restores. Many years ago, the main reason for such restores was hardware failure because the failure of a disk system often meant a complete restore from scratch.

Dec 26, 2022

New info-stealer malware infects software pirates via fake cracks sites

Posted by in category: cybercrime/malcode

A new information-stealing malware named ‘RisePro’ is being distributed through fake cracks sites operated by the PrivateLoader pay-per-install (PPI) malware distribution service.

RisePro is designed to help attackers steal victims’ credit cards, passwords, and crypto wallets from infected devices.

The malware was spotted by analysts at Flashpoint and Sekoia this week, with both cybersecurity firms confirming that RisePro is a previously undocumented information stealer now being distributed via fake software cracks and key generators.

Dec 26, 2022

Is AI Translation the Future of Video Games?

Posted by in categories: cybercrime/malcode, education, Elon Musk, information science, mobile phones, robotics/AI, space

In the midst of the Anti AI Art movement and the ever evolving complexity of the algorithms they are rallying against, this video essay discusses current flaws and future potential of AI Translation technology within Retro Game Emulation. Through rigorous testing of 3 games that never got localizations or fan translations (Tokimeki Memorial 2, Sakura Wars 2 & Boku No Natsuyasami 2), we will see how well Retroarch and ZTranslate’s AI Translator works for the average player. We will also discuss the ways in which this technology could one day be used in more formal localisations by professional teams, and wel will come to understand the nuances of the AI debate.

#AI #FanTranslation #Emulation.

Continue reading “Is AI Translation the Future of Video Games?” »

Dec 22, 2022

OWASSRF: There is a new exploit chain dubbed

Posted by in category: cybercrime/malcode

OWASSRF that threat actors are actively exploiting to gain arbitrary code execution through Outlook Web Access (OWA) on vulnerable servers that bypasses ProxyNotShell URL rewrite mitigations.

A recent investigation by CrowdStrike Services found that Microsoft Exchange ProxyNotShell vulnerabilities are probably enabled the common entry vector for several Play ransomware intrusions:

The relevant logs were reviewed by CrowdStrike and no evidence of initial access exploiting CVE-2022–41040 was found.

Dec 21, 2022

GodFather Android malware targets 400 banks, crypto exchanges

Posted by in categories: cryptocurrencies, cybercrime/malcode, finance, robotics/AI

An Android banking malware named ‘Godfather’ has been targeting users in 16 countries, attempting to steal account credentials for over 400 online banking sites and cryptocurrency exchanges.

The malware generates login screens overlaid on top of the banking and crypto exchange apps’ login forms when victims attempt to log in to the site, tricking the user into entering their credentials on well-crafted HTML phishing pages.

The Godfather trojan was discovered by Group-IB analysts, who believe it is the successor of Anubis, a once widely-used banking trojan that gradually fell out of use due to its inability to bypass newer Android defenses.

Page 38 of 194First3536373839404142Last