Category: CySecurity News – Latest Information Security and Hacking Incidents

Northern European Criminals Copy the Lockbit Gang

  The threat group, known as LockBit, is one of the most notorious ransomware groups operating currently. As a result, they have become very active on dark web forums. In addition, they are exploiting the negative publicity created by other…

Titan-Stealer: A New Golang-based Info-Stealer Malware

Recently, a new Golang-based information stealer malware, named ‘Titan Stealer’ is being promoted by threat actors in their Telegram channel. Initial details regarding the malware were discovered by cybersecurity researcher Will Thomas in November 2022 by using the IoT search…

Qwant or DuckDuckGo: Which Search Engine is More Private?

Qwant and DuckDuckGo are two privately-focused search engines that guarantee not to track your activities. Their ability to assist you in avoiding the privacy-invading methods that are all too prevalent among big search engines is one of the key components…

Password Changes are Required for LastPass Customers

  Despite being one of the most popular password managers on the market, LastPass has suffered another major breach, putting the passwords of customers risk as well as their personal information.   It was established just over a year ago that…

FBI Takes Down the Infamous Ransomware Gang’s Website

  In a statement last week, the US Department of Justice claimed to have made progress against the significant ransomware organisation known as Hive.  Since last July, the FBI has been infiltrating Hive’s computer networks, and its disruption of the…

Evolution of Gootkit Malware Using Obfuscations

Mandiant Managed Defense has reliably resolved GOOTLOADER infections since January 2021. When spreading GOOTLOADER, malicious actors cast a wide net, affecting a variety of industrial verticals and geographical areas. Gootkit Malware The Gootkit Trojan is Javascript-based malware that carries out…

Government Issues High-risk Warning for iPhone Users

  Apple iPhones are known for their strength and security features. The Cupertino-based tech behemoth releases security updates for its devices on a regular basis. Although Apple recommends that people install the most recent builds of iOS on their iPhones…

Riot Games Hit by Data Breach

Riot Games reported last week that a social engineering attempt had infiltrated the systems in their software platform. Motherboard got the ransom note that was sent to Riot Games and reported that hackers demanded $10 million in exchange for keeping…

DOJ Reveals: FBI Hacked Hive Ransomware Gang

The U.S. Department of Justice (DOJ) recently confirmed that the FBI has infiltrated the activities of a popular cyber-crime gang, covertly disrupting their hacking attacks for more than six months.  According to DOJ, FBI gained deep access to the Hive…

Aurora Infostealer Malware Uses Shapeshifting Techniques

  One of the most recent discoveries was the Aurora Stealer malware, which imitated popular applications in order to infect as many users as possible. Cyble researchers discovered that threat actors are actively changing and customizing their phishing websites in…

Take Steps to Protect Your Enterprise Against the Risks

  Earlier this month, the Apache Software Foundation announced that its log4j Java-based logging utility (CVE-2021-44228) had been vulnerable to a remote code execution vulnerability (CVE-2021-4428). It was rated a critical severity vulnerability by MITRE and given a CVSS score…

This New Python RAT Malware Targets Windows in Attacks

  A new Python-based malware has been discovered in the wild, with remote access trojan (RAT) capabilities that permit its operators to regulate the compromised systems. The new RAT, dubbed PY#RATION by researchers at threat analytics firm Securonix, communicates with…

North Korean Hackers Target Crypto Users with Phony Job Offers

  In an effort to commit cryptocurrency heists, North Korean hackers are exhibiting a “startup mentality,” according to a report released on Wednesday by cybersecurity company Proofpoint.  The Sunnyvale, California-based company claimed that in December, a group they call TA444,…

Source Code & Private Data Stolen From GoTo

GoTo, the parent company of LastPass, has disclosed that hackers recently broke into its systems and seized encrypted backups belonging to users. It claimed that in addition to LastPass user data, hackers managed to obtain data from its other enterprise…

Cyberwarfare Threat Looming Large on Firms Worldwide

  Over the past ten years or so, the environment for cyber threats has undergone a significant transformation, which has accelerated in recent years. The term “cyberwar” didn’t even exist until 30 years ago, and it’s still somewhat debatable today. …

Supply Chain Attacks Induced More Data Breaches than Malware

  As reported by the Identity Theft Resource Center, the first half of 2022 saw fewer compromises reported, owing in part to Russian-based cybercriminals being distracted by the war in Ukraine and volatility in cryptocurrency markets.  However, data compromises rose…

Linux Malware Records a New High in 2022

While more and more devices are adopting Linux as their operating system, the popularity of the software has nonetheless attracted cyber-criminals. According to recent reports, the number of malware aimed at the software increased dramatically in 2022.  As per the…

PayPal Users Should Check Their Accounts

  It seems that scammers never cease trying to con people. Keeping customers’ information private and secure is of the utmost importance to companies, so they use many ways to protect against a breach in their network.  Despite these digital…

LAUSD Computers are Breached via Cybercriminals

According to Los Angeles Unified School District (LAUSD), the second-largest school district in the U. S., the Vice Society ransomware group has stolen files containing private information, including Social Security Numbers, from contractors (SSNs). Additionally, LAUSD disclosed that the threat…

After a Vendor Hack, FanDuels Warns of a Data Breach

  A security breach has been detected at FanDuel’s sportsbook and betting site, which exposed customers’ names, email addresses, and payment information. This occurred in January 2023, when MailChimp’s security was breached. A security advisory urges users to be wary…

Cyber Thieves Target Retirement Accounts

Data security has become a priority for tax returns, credit cards, and other conventional targets of cyber criminals. Online thieves have recently been targeting employer retirement plans and the accounts in the plans.  Data security at retirement plans varies, and…

Ransomware Profits Shrink, as Victims Refuse to Pay

  As per data from blockchain analysis firm Chainalysis, ransomware revenue for 2022 has dropped from $765.6 million to at least $456.8 million, representing a -40.3% year-over-year drop. The number of attacks is as high as it has ever been,…

Phishing Scam Blank Image Masks Code in SVG Files

  Researchers from Avanan have seen the worldwide spread of a new threat known as ‘Blank Image,’ where hackers attach blank images to HTML messages. The user is instantly sent to a malicious URL once they open the attachment. Blank Image…

Malware Can Be Written With ChatGPT, as it Turns Out

  With its multi-talented AI chatbot, ChatGPT, the company now has another skill to add to its LinkedIn profile: it is capable of creating sophisticated “polymorphic” malware.  The chatbot from OpenAI has been reported as both skilled and resourceful when…

Security Vendors are Turning to GPT as a Key AI Technology

  A number of businesses are utilising conversational AI technology to improve their product capabilities, including for security, despite some concerns about how generative AI chatbots like ChatGPT can be used maliciously — to create phishing campaigns or write malware. …

Roaming Mantis Virus Features DNS Setups

Malicious actors linked to the Roaming Mantis attack group were seen distributing an updated variation of their patented mobile malware called Wroba to compromise Wi-Fi routers and perform Domain Name System (DNS) theft. Kaspersky found that the threat actor behind…

Blockchain: Is it hackable?

  Following high-profile blockchain hacks in the last year, many people have been left wondering: is the blockchain hackable? The short answer is that any system can be attacked. However, because blockchain is decentralized, hackers may find it more difficult…

DoControl: Growing its SaaS Security Platform

DoControl offers an integrated, automated, and risk-aware SaaS Security Platform that protects apps and data which are essential to corporate operations promotes operational efficiency and boosts productivity. Protecting data and business-critical SaaS apps through automated remediation is DoControl’s key strength.…

Google Receives Sensitive Data From Abortion Pill Websites

  Several online pharmacies are selling abortion pills online and sharing their customers’ personal information, such as their search history and geolocation, with Google and other third parties. ProPublica has learned that by using this information, one can identify the…

Info-stealing Ads Spread by Malvertising

HP Wolf Security’s cybersecurity researchers have issued a warning about various ongoing activities that aim to use typosquatting domains and malicious advertising to spread different types of malware to unwitting victims. Additionally, the scammers paid various ad networks to broadcast…

Rhadamanthys: Malware Hidden in Google Ads

Threat actors are establishing fraudulent websites for popular free and open-source software in order to promote malicious downloads via advertisements present in the Google search result.  The info-stealing malware Rhadamanthys uses Google advertisements as a means of luring people into…

Synthetic Identity Fraud: What Is It?

Frankenstein ID, the use of fake identities by scammers, has become prevalent over the last 12 to 18 months, with US financial institutions (FIs) reporting losses of $20 billion in 2021 as compared to $6 billion in 2016. Synthetic Identity…

Gen Digital Customers’ Accounts were Breached by Hackers

  A Norton LifeLock spokesperson has confirmed that malicious third parties are likely to have gained access to some customers’ accounts, possibly even gaining access to their password vaults.  The document describing affected customers’ rights as a result of a…

Microsoft Quietly Revealed a New Kind of AI

In the tangible future, humans will be interfacing their flesh with chips. Therefore, perhaps we should not have been shocked when Microsoft’s researchers appeared to have hastened a desperate future.  It was interestingly innocent and so very scientific. The headline…

Emails are Vulnerable to Cyber Threat

Small businesses and organizations of various sizes worldwide rushed to upload patches and assess what had been compromised. Hacks expose the vulnerability of the 32 million small businesses, which are largely unable to afford to work with cybersecurity firms and…

Mass Data Scraping Lawsuit Filed by Meta

  As part of a lawsuit filed against the digital surveillance firm Voyager Labs, Meta claims that the company created 38,000 fake, unauthorized accounts to collect 600,000 Facebook users’ personal information.  A federal lawsuit filed by Microsoft has asked a…

5 Updates to Secure Data as Workers Return to Work

According to an Adastra survey, more than 77% of IT decision-makers in the U.S. and Canada estimate their organizations will likely experience a data breach over the next three years. Employees should be aware of data security practices since the…

CircleCI Breach: Encryption Keys & User Data Seized

  A software company CircleCi has acknowledged that a data breach that occurred last month resulted in the theft of customers’ personal information.  After an engineer contracted data-stealing malware that made use of CircleCi’s 2FA-backed SSO session cookies to get…

To Get Around Security, Hackers Use This Old Trick

  An old vulnerability in Intel drivers is being exploited by cybercriminals in an attempt to gain access to networks. This is in the form of a security flaw that enables them to get around cybersecurity measures and bypass security…

Ransomware Gangs are Starting to Forego Encryption

  Criminal organisations are now employing a new strategy to ensure ransomware payouts: they skip the step of encrypting target companies’ systems and instead go straight to demanding the ransom payment for the company’s valuable data. Malicious hackers are constantly…

CircleCI Breach : Encryption Keys & User Data Seized

  A software company CircleCi has acknowledged that a data breach that occurred last month resulted in the theft of such customers’ personal information.  After an engineer contracted data-stealing malware that took use of CircleCi’s 2FA-backed SSO session cookies to…

Cisco Fixes a Major Issue in Small Business Routers

Several end-of-life (EoL) VPN routers are affected by a critical authentication bypass flaw that Cisco alerted customers. The issue has publicly available attack code. Hou Liuyang of Qihoo 360 Netlab discovered the security hole (CVE-2023-20025) in the internet management interface…

What’s 6G & its Way Forward?

  Mobile connectivity has come a long way since 1979 when NTT initiated the first generation of cellular networks in Tokyo. 2G and 3G quickly followed 1G. These were voice and text communication networks. The more recent 4G and 5G…

Report: Crypto Crime Hits Record $20 Billion in 2022

  The unlawful use of cryptocurrencies reached a new high of $20.1 billion last year, as transactions involving companies sanctioned by the United States skyrocketed, as per data from blockchain analytics firm Chainalysis released on Thursday. In 2022, the cryptocurrency…

Is AI Transforming the Cybersecurity Sector?

Artificial intelligence and machine learning (AI/ML) systems have proven to be effective in improving the sophistication of phishing lures, creating fake profiles, and developing basic malware. Security experts have demonstrated that a complete attack chain may be established, and malicious…

PyPl Hosting Malware and AWS Keys

  The Python package repository PyPI was discovered to be hosting malware and AWS keys. Tom Forbes, a software developer, created a Rust-based application that searched all new PyPI packages for AWS API keys. The tool returned 57 successful results,…

Italian Users Warned of New Info-Stealer Malware Campaign

The Uptycs Threat research team has revealed a new malware campaign, targeting Italy with phishing attacks in order to deploy information-stealing malware on victims’ compromised Windows systems.  According to Uptycs security researcher Karthickkumar Kathiresan, the malware campaign is designed to…

Prototype Pollution-like Bug Variant Found in Python

Prototype Pollution Prototype pollution is a severe vulnerability class associated with prototype-based languages, the most popular among them being JavaScript.  However, a researcher has discovered Python-specific variants of prototype pollution, and other class-based programming languages may also be exposed to…

The PoweRAT Malware Attacks PyPI Users

  The software supply chain security company Phylum has discovered a malicious assault using the PoweRAT backdoor and an information thief that targets users of the Python Package Index (PyPI). The campaign was initially discovered on December 22, 2022, when…