In a significant blow to one of the most prolific ransomware operations, authorities from the U.S. and U.K., in collaboration with international law enforcement, have disrupted the LockBit ransomware variant. The coordinated effort led to the arrest of two operators…
Category: GBHackers on Security | #1 Globally Trusted Cyber Security News Platform
Reddit Signed a $60,000,000 Content Licensing Deal with an AI company
Reddit, the popular social media platform known as the “front page of the internet,” has reportedly signed a significant content licensing agreement with an undisclosed AI company. This $60 million deal is poised to impact AI research substantially, Reddit’s impending…
Meta Unveils 8 Spyware Companies Targeting iOS, Android, & Windows Devices
Spyware firms target iOS, Android, and Windows devices due to their widespread usage, making them lucrative targets for gathering sensitive information. Each platform offers unique exploitation opportunities, with iOS and Android dominating the mobile market, while Windows remains a primary…
Alpha Ransomware Uses Living-Off-The-Land Tools To Attack Windows Computers
Ransomware utilizes living-off-the-land tools in Windows attacks for stealth and evasion. They can blend in with normal system activities by leveraging legitimate, built-in tools like PowerShell or Windows Management Instrumentation (WMI). This stealthy move makes it harder for security measures…
LockBit Ransomware Gang Disrupted by Global Law Enforcement Operation
Earlier this week, Europol and the UK’s National Crime Agency announced they had successfully taken down the dark web platform associated with LockBit, a notorious ransomware group. LockBit has been one of the most active and prolific ransomware groups, and…
Warning: Agniane Stealer Targeting Users to Steal Financial Data
Threat actors use stealers to collect sensitive information from unsuspecting users covertly. These tools are favored for their ability to infiltrate systems, remain undetected, and extract valuable data, which threat actors can exploit for financial gain and several malicious purposes.…
Hackers Arrested For Stealing Banking Credentials Using Android Malware
An individual residing in Vinnytsia, aged 31, has been apprehended for purportedly pilfering confidential data of Android users and exploiting their Google accounts belonging to citizens of the United States and Canada. The cybercrime incident resulted in the perpetrator acquiring…
Hackers Arrested For Stealing Banking Credentials Using Novel Android Malware
An individual residing in Vinnytsia, aged 31, has been apprehended for purportedly pilfering confidential data of Android users and exploiting their Google accounts belonging to citizens of the United States and Canada. The cybercrime incident resulted in the perpetrator acquiring…
SolarWinds ARM Flaw Let Attackers Execute Remote Code
SolarWinds has released their Access Rights Manager version 2023.2.3, in which several vulnerabilities associated with Deserialization and Directory Traversal leading to Remote code execution have been fixed. The CVEs of these vulnerabilities were assigned with The severity for these vulnerabilities…
Akira Ransomware Actively Exploiting Cisco Anyconnect Vulnerability
Threat actors exploit Cisco AnyConnect vulnerabilities to gain unauthorized access to networks, compromise sensitive information, and potentially execute malicious activities. Exploiting these vulnerabilities allows attackers to bypass security measures, leading to unauthorized control over network resources, potential disruptions to operations,…
ESET Privilege Escalation Flaw Let Attackers Delete Arbitrary Files
ESET, a cybersecurity firm, has released patches for a high-severity vulnerability identified in several Windows-based security products, including consumer, business, and server security. The vulnerability tracked as CVE-2024-0353 has a CVSS score of 7.8 and was identified in the real-time…
New TicTacToe Malware Dropper Attacking Windows Users
Malware often targets Windows users due to the operating system’s widespread popularity, making it a lucrative target for threat actors. Windows systems have historically been perceived as more vulnerable due to their larger user base and the majority of security…
Turla APT’c New Tool Designed to Steal Login Credentials
The Russian cyber espionage threat group “Turla APT group” was discovered to be using a new backdoor for its malicious operations. This new backdoor has been termed “TinyTurla-NG” (TTNG), which shares similarities with a previously disclosed implant, TinyTurla, regarding coding…
First Ever iOS Trojan Steals Facial Recognition Data
A novel, very sophisticated mobile Trojan dubbed GoldPickaxe.iOS that targets iOS users exclusively was discovered to collect facial recognition data, intercept SMS, and gather identity documents. The Asia-Pacific region includes the majority of those impacted by this harmful activity. On the other hand,…
1000+ JetBrains TeamCity Instances Vulnerable to RCE Bypass Attacks
A critical security vulnerability was detected in TeamCity On-Premises, tagged as CVE-2024-23917, with a CVSS score of 9.8. An unauthenticated attacker with HTTP(S) access to a TeamCity server may bypass authentication procedures and take administrative control of that TeamCity server…
Ukrainian Hacker Pleads Guilty for Leading Zeus & IcedID Malware Attacks
Vyacheslav Igorevich Penchukov, a 37-year-old resident of Donetsk, Ukraine, has pleaded guilty to his key role in developing and deploying the notorious Zeus and IcedID malware attacks. In 2022, he was apprehended in Switzerland and extradited to the United States…
New Outlook 0-day RCE Flaw Exploited in the Wild
Outlook has been discovered to have an interesting vulnerability while handling specific hyperlinks, which was found to be exploited by threat actors in the wild. This vulnerability has been assigned with CVE-2024-21413, and the severity was given as 9.8 (Critical).…
Wireshark 4.2.3 Released – What’s New!
Wireshark is backed by the nonprofit Wireshark Foundation, which relies on your support to advance protocol analysis education. However, Wireshark 4.2.3 is out now, and this new version is Packed with multiple new features, rich protocol support, user-friendly design, and…
How to Analyse an Advanced Phishing Attack with ANY.RUN Threat Intelligence Lookup
An advanced phishing attack typically involves sophisticated tactics such as compelling email and website replicas that are often tailored to specific targets. These attacks may use social engineering techniques to manipulate victims into revealing sensitive information and installing malware. Cybersecurity…
OpenAI Shuts Down Accounts Used to Generate Phishing Emails & Malware
While Artificial Intelligence holds immense potential for good, its power can also attract those with malicious intent. State-affiliated actors, with their advanced resources and expertise, pose a unique threat, leveraging AI for cyberattacks that can disrupt infrastructure, steal data, and…