Strelastealer malware has been found to be distributed in large-scale campaigns that have currently impacted over 100 organizations across the U.S. and EU. The malware was first discovered in 2022 and is capable of stealing a victim’s email login information…
Category: GBHackers on Security | #1 Globally Trusted Cyber Security News Platform
Beware of New ‘HelloFire’ Ransomware Actor Mimic as a Pentester
A new threat is the emergence of a ransomware encryptor dubbed ‘HelloFire.’ This new player in the cybercrime arena is employing deceptive tactics to disguise its malicious intent as legitimate penetration testing activities. Here’s what you need to know about…
Linux Admins Beware! Fake PuTTY Client that Installs Rhadamanthys stealer
A malvertising campaign has been discovered deploying a fake PuTTY client to deliver the Rhadamanthys stealer, a dangerous malware. This campaign cleverly exploits the trust in the widely used SSH and Telnet client, PuTTY, by presenting a counterfeit website through…
Linux Admins Beware! Fake PuTTY Client that Rhadamanthys stealer
A malvertising campaign has been discovered deploying a fake PuTTY client to deliver the Rhadamanthys stealer, a dangerous malware. This campaign cleverly exploits the trust in the widely used SSH and Telnet client, PuTTY, by presenting a counterfeit website through…
Hackers Claiming Unauthorized Access to the Fortinet Devices of Many Companies
Hackers have claimed unauthorized access to Fortinet devices across various companies. This breach highlights cybercriminals’ persistent threat to corporate security infrastructures and the importance of robust cybersecurity measures. Overview of the Breach A tweet from a dark-themed webpage has surfaced,…
Hackers Transform the Raspberry Pi into an Online Anonymity Tool
A new tool, GEOBOX, was advertised on the Dark Web that utilizes Raspberry Pi devices for fraud and anonymization, allowing users to spoof GPS locations, emulate network settings, mimic Wi-Fi access points, and bypass anti-fraud filters. Criminals were using multiple…
Sign1 Malware Hijacked 39,000 WordPress Websites
A client’s website was experiencing random pop-ups as server side scanner logs revealed a JavaScript injection related to Sign1, which is a malware campaign that targets websites and has infected over 2,500 websites in the past two months and uses…
Hackers Deploy STRRAT & VCURMS Malware on Windows Via GitHub
A new phishing campaign targets users with emails containing a button to “verify payment information.” Clicking the button triggers the download of a malicious JAR file (disguised as an invoice) that leverages a PowerShell command to download two additional JARs. …
Microsoft Xbox Gaming Services Flaw Let Attackers Gain SYSTEM Privileges
A new elevation of privilege vulnerability has been discovered in the Xbox Gaming services that allow a threat actor to elevate their privileges to that of a SYSTEM. This particular vulnerability has been assigned CVE-2024-28916, and its severity has been…
GoFetch Side-Channel Attack Impact Apple CPUs: Attackers Steal Secret Keys
Researchers have unveiled a new class of microarchitectural side-channel attacks that pose a severe threat to the security of Apple CPUs. The attack, GoFetch, exploits the Data Memory-dependent Prefetchers (DMPs) in modern processors to extract secret cryptographic keys from constant-time…
DHCP Hacked to Escalate Privileges in Windows Domains
Security researchers have uncovered a sophisticated method of exploiting the Dynamic Host Configuration Protocol (DHCP) administrators group to escalate privileges within Windows domains. This technique, dubbed “DHCP Coerce,” leverages legitimate privileges to compromise entire networks potentially. The vulnerability centers around…
Exploit Released For Critical Fortinet RCE Flaw: Patch Soon!
FortiClientEMS (Enterprise Management Server), the security solution used for scalable and centralized management, was discovered with an SQL injection vulnerability that could allow an unauthenticated threat actor to execute unauthorized code or command on vulnerable servers through specially crafted requests. …
One-Click AWS Vulnerability Let Attackers Takeover User’s Web Management Panel
Tenable Research has identified a critical vulnerability within the AWS Managed Workflows for Apache Airflow (MWAA) service, which they have named “FlowFixation.” This vulnerability could have permitted attackers to execute a one-click takeover of a user’s web management panel for…
TeamCity Vulnerability Exploits Leads to Surge in Ransomware Attacks
Attackers are taking advantage of vulnerabilities in JetBrains Teamcity to distribute ransomware, coinminers, and backdoor payloads. Two critical vulnerabilities in the TeamCity On-Premises platform, identified as CVE-2024-27198 and CVE-2024-27199 by JetBrains, were published on March 4, 2024. These flaws enable…
TinyTurla Evolved TTPs To Stealthly Attack Enterprise Organizations
Staying ahead of security measures and exploiting new vulnerabilities requires hackers to change their tactics. By doing so, they manage to bypass better defenses, maximize success rates, and keep on with their illegal activities. The adaptation of techniques by hackers…
Unsaflok Vulnerability Lets Hackers Open 3M+ Hotel Doors in Seconds
A group of cybersecurity researchers has uncovered several critical security flaws in the Saflok electronic RFID locks by Dormakaba. These locks, widely used in hotels and multi-family housing environments across 131 countries, are now known to be susceptible to a…
Researchers Propose An Invisible Backdoor Attack Dubbed DEBA
As deep neural networks (DNNs) become more prevalent, concerns over their security against backdoor attacks that implant hidden malicious functionalities have grown. Cybersecurity researchers (Wenmin Chen and Xiaowei Xu) recently proposed DEBA, an invisible backdoor attack leveraging singular value decomposition…
Hacker Pleads Guilty For Stealing 132,000+ Users Data
Robert Purbeck, a hacker known as “Lifelock” and “Studmaster,” hacked into the computer servers of the City of Newnan, a medical clinic in Griffin, and at least 17 other victims across the US. He stole the personal information of more…
Nemesis Market: Leading Darknet Market Seized
The infamous Nemesis Market, a leading figure in the darknet marketplace ecosystem, has been successfully seized. This operation dismantles a major hub of illegal online trade, ranging from narcotics to stolen data, affecting thousands of users worldwide. The Rise of…
North Korea’s Kimsuky Group Equipped to Exploit Windows Help files
Cybersecurity experts have uncovered a sophisticated cyber espionage campaign orchestrated by the North Korean threat actor group Kimsuky, Black Banshee, or Thallium. This group, notorious for its intelligence-gathering missions, has been active since at least 2012. It has primarily targeted…