Menu

Blog

Archive for the ‘cybercrime/malcode’ category: Page 70

Aug 6, 2022

Hackers Have Found A New Way To Hack Into Microsoft Email Account

Posted by in categories: business, cybercrime/malcode

Security researchers at Zscaler’s ThreatLabz group have discovered a new strain of a large-scale phishing campaign, which uses an adversary-in-the-middle (AiTM) attack technique capable of bypassing multi-factor authentication (MFA).

For the unversed, AiTM attack is a cyberattack where the attacker secretly conveys and possibly alters the communications between two parties who believe that they are directly communicating with each other, as the attacker has inserted themselves between the two parties. Hackers through this method can use the stolen cookies to log in and completely evade MFA.

The main purpose of the large-scale phishing campaign is believed to be breaching of corporate accounts to conduct BEC (business email compromise) attacks, which redirects payments toward the hacker’s bank account using forged documents, as reported by BleepingComputer.

Aug 5, 2022

Some of Taiwan’s 7-Eleven outlets said an ‘unknown source’ hacked their store TVs to display the message ‘Warmonger Pelosi get out of Taiwan’

Posted by in categories: cybercrime/malcode, energy

Meanwhile, Taiwan’s Presidential Palace said cyberattack traffic on its website spiked by 200 times hours before Nancy Pelosi’s arrival in Taipei.


Bill Gates-founded Breakthrough Energy Ventures co-led a $44 million funding round for a startup that aims to accelerate solar far construction.

Aug 5, 2022

Futureseek Daily Link Review; 05 August 2022

Posted by in categories: cosmology, cybercrime/malcode, economics, mathematics, particle physics, quantum physics, robotics/AI, space travel, surveillance

* At Long Last, Mathematical Proof That Black Holes Are Stable * Who Gets to Work in the Digital Economy? * Mice produce rat sperm with technique that could help conservation.

* Quantum computer can simulate infinitely many chaotic particles * Radar / AI & ML: Scaling False Peaks * Cyber security for the human world | George Loukas | TEDx.

Continue reading “Futureseek Daily Link Review; 05 August 2022” »

Aug 4, 2022

VirusTotal Reveals Most Impersonated Software in Malware Attacks

Posted by in category: cybercrime/malcode

Threat actors are increasingly mimicking legitimate applications like Skype, Adobe Reader, and VLC Player as a means to abuse trust relationships and increase the likelihood of a successful social engineering attack.

Other most impersonated legitimate apps by icon include 7-Zip, TeamViewer, CCleaner, Microsoft Edge, Steam, Zoom, and WhatsApp, an analysis from VirusTotal has revealed.

“One of the simplest social engineering tricks we’ve seen involves making a malware sample seem a legitimate program,” VirusTotal said in a Tuesday report. “The icon of these programs is a critical feature used to convince victims that these programs are legitimate.”

Aug 4, 2022

Thousands of hackers flock to ‘Dark Utilities’ C2-as-a-Service

Posted by in category: cybercrime/malcode

Security researchers found a new service called Dark Utilities that provides an easy and inexpensive way for cybercriminals to set up a command and control (C2) center for their malicious operations.

The Dark Utilities service provides threat actors a platform that supports Windows, Linux, and Python-based payloads, and eliminates the effort associated with implementing a C2 communication channel.

A C2 server is how adversaries control their malware in the wild, sending out commands, configurations and new payloads, and receiving data collected from compromised systems.

Aug 3, 2022

Hackers Loot Blockchain Bridge for Millions In “Frenzied Free For All”

Posted by in categories: blockchains, cryptocurrencies, cybercrime/malcode

On Monday, hackers exploited a basic vulnerability in the code of Nomad — a crypto “bridge” that allows customers to transfer cryptocurrencies between different blockchains — getting away with roughly $190 million in user investments, CNBC reports.

This hack is just the latest in a string of attacks on crypto bridges, platforms that, according to CNBC, have collectively lost more than $1 billion to hackers in 2022 alone.

Given that Nomad markets itself as a “secure” platform, the company definitely has a lot of explaining to do.

Aug 3, 2022

Wolf in sheep’s clothing: how malware tricks users and antivirus

Posted by in category: cybercrime/malcode

One of the primary methods used by malware distributors to infect devices is by deceiving people into downloading and running malicious files, and to achieve this deception, malware authors are using a variety of tricks.

Some of these tricks include masquerading malware executables as legitimate applications, signing them with valid certificates, or compromising trustworthy sites to use them as distribution points.

According to VirusTotal, a security platform for scanning uploaded files for malware, some of these tricks are happening on a much larger scale than initially thought.

Aug 2, 2022

Researchers Discover Nearly 3,200 Mobile Apps Leaking Twitter API Keys

Posted by in categories: cybercrime/malcode, space

Researchers have reported the discovery of an exoplanet orbiting Ross 508 near the inner edge of its habitable zone.


Researchers have uncovered a list of 3,207 mobile apps that are exposing Twitter API keys in the clear, some of which can be utilized to gain unauthorized access to Twitter accounts associated with them.

The takeover is made possible, thanks to a leak of legitimate Consumer Key and Consumer Secret information, respectively, Singapore-based cybersecurity firm CloudSEK said in a report exclusively shared with The Hacker News.

Continue reading “Researchers Discover Nearly 3,200 Mobile Apps Leaking Twitter API Keys” »

Aug 2, 2022

Australian Hacker Charged with Creating, Selling Spyware to Cyber Criminals

Posted by in categories: business, cybercrime/malcode

A 24-year-old Australian hacker has been charged with developing and selling the “Imminent Monitor” spy software to more than 14,500 people.


Critical Security Vulnerabilities In Netgear Business Routers Which The Netgear Team Can’t Fix. Stop Using These Routers As Soon As Possible — Vulnerabilities — Information Security Newspaper | Hacking News.

Aug 2, 2022

Critical Security Vulnerabilities In Netgear Business Routers Which The Netgear Team Can’t Fix. Stop Using These Routers As Soon As Possible

Posted by in categories: business, cybercrime/malcode

Vulnerabilities — information security newspaper | hacking news.

Page 70 of 212First6768697071727374Last