Mobile Guardian, a leading Mobile Device Management (MDM) vendor, experienced unauthorized access to its platform on August 4th. The incident has impacted iOS and ChromeOS devices enrolled globally in the Mobile Guardian system. What Happened On August 4th at 2…
Category: GBHackers on Security | #1 Globally Trusted Cyber Security News Platform
Authorities have Uncovered USD 40 Million from Hackers
Singapore authorities have successfully intercepted and reclaimed over USD 40 million defrauded in a sophisticated business email compromise (BEC) scam. The operation, facilitated by INTERPOL’s Global Rapid Intervention of Payments (I-GRIP) mechanism, marks the largest-ever recovery of fraudulently obtained funds…
Threat Actor Claiming Breach of Gregory’s Foods 400Gb Database
A threat actor has claimed responsibility for breaching Gregory’s Foods, a well-known supplier of frozen bread, bun, and cookie doughs, among other bakery products. The announcement was made on a dark web forum, where the alleged hacker stated that a…
New LianSpy Attacking Android Users to Steal Sensitive Data
Cybersecurity experts have uncovered a sophisticated Android spyware, LianSpy, targeting users to steal sensitive data. This spyware employs advanced evasion techniques, making it a significant threat to Android device users worldwide. How LianSpy Operates LianSpy begins its operation by determining…
Threat Actor Allegedly Claims Leak of SisaCloud Database
A threat actor has reportedly claimed responsibility for leaking a database belonging to SisaCloud, Thailand’s School Information System Advance. This alarming news was first reported by DailyDarkWeb on their social media platform, X.com, raising significant concerns about the security of…
Beware Of Fake AI Editor Website That Steals Your Login Credentials
Hackers often make use of fake AI editor websites for several illicit purposes with malicious intent. Among their prime activities are deceiving users into providing personal information, downloading malware, making payments for fraudulent services, and many more. Recently, cybersecurity researchers…
Hackers Abused StackExchange Platform To Deliuver Malicious Python Package
Attackers uploaded malicious Python packages targeting Raydium and Solana users to PyPI, leveraging a StackExchange post to distribute the malware. The multi-stage malware stole sensitive data, drained cryptocurrency wallets, and established persistent backdoor access, bypassing Windows security protections, underscoring the…
Mirai Botnet Attacking Apache OFBiz Directory Traversal Vulnerability
The notorious Mirai botnet has been observed exploiting a recently disclosed directory traversal vulnerability in Apache OFBiz. This Java-based framework, supported by the Apache Foundation, is used for creating ERP (Enterprise Resource Planning) applications, which are critical for managing sensitive…
Hackers Infect Windows With Backdoor Malware Via “Car For Sale” Ad
Fighting Ursa, a Russian APT, has employed a car sales phishing lure to distribute the HeadLace backdoor malware targeting diplomats since March 2024. This strategy mirrors previous campaigns by the group and other Russian threat actors. The attack leveraged public,…
Exodus Underground Market Place Emerging As A Heaven For Cybercriminals
The Exodus Market, a haven for exiled criminals, has grown to become a significant player in the black market economy. The user “ExodusMarket” originally announced Exodus Market for Logs on the Cracked forum on February 10, 2024, after it was…
Mint-stealer Targeting web browsers, VPN clients & messaging apps to Steal Logins
Mint-Stealer is a Malware-as-a-Service tool designed to exfiltrate sensitive data from compromised systems stealthily and targets a broad spectrum of data, including web credentials, cryptocurrency wallet details, gaming credentials, VPN configurations, messaging app data, and FTP client information. Employing encryption…
Hackers Hijacked ISP Service Provider To Poison Software Updates
Hackers often attack ISP service providers for several illicit purposes. The most significant ones are disrupting internet services, stealing sensitive data, and many more. Besides this, such compromise also provides hackers with control over a vast number of connected devices,…
Beware Of New BingoMod Android Malware Steals Money & Formats Device
The wide use and the huge user base of Android often lucrative the threat actors. As threat actors often use Android malware to exploit vulnerabilities in the Android operating system. This enables them to perform several illicit activities like stealing…
Researchers Details How Hackers Can Steal Passwords via HDMI Cables
Security researchers have found a new way for hackers to steal sensitive information like passwords by eavesdropping on HDMI cables. This is a worrying development for computer users. Researchers at Universidad de la República in Uruguay discovered that hackers can…
Leaked Wallpaper Vulnerability Exposes Windows Users to Privilege Escalation Attacks
A newly discovered vulnerability in Windows File Explorer has raised alarms within the cybersecurity community. Identified as CVE-2024-38100, this security flaw allows attackers to escalate privileges by exploiting a seemingly innocuous wallpaper feature. CVE-2024-38100 – Windows File Explorer Elevation of…
Authorities Seized Cryptonator Site & Charged the Admin
The IRS-Criminal Investigation, the US Department of Justice (DOJ), and the Federal Bureau of Investigation (FBI), in partnership with the German Federal Criminal Police Office (BKA) and the Attorney General’s Office in Frankfurt, successfully seized the domain of the online…
Microsoft Patched a Critical Edge Flaw that Led to Arbitrary Code Execution
Microsoft has addressed several critical vulnerabilities in its Chromium-based Edge browser. Users of the affected versions are strongly advised to update to the latest version to mitigate potential security risks. According to the Asec Ahnlab reports, the vulnerabilities were found…
Hackers Actively Exploiting WordPress Plugin Arbitrary File Upload Vulnerability
Hackers have been actively exploiting a critical vulnerability in the WordPress plugin 简数采集器 (Keydatas). The vulnerability, CVE-2024-6220, allows unauthenticated threat actors to upload arbitrary files to a vulnerable site, potentially leading to remote code execution and complete site takeover. This…
NCA Shuts Down Major Fraud Platform that Triggers 1.8 Million Scam Calls
Today, the National Crime Agency (NCA) revealed the successful shutdown of Russian Coms, a sophisticated fraud platform responsible for defrauding thousands of victims worldwide. Established in 2021, this platform facilitated over 1.3 million scam calls to 500,000 unique UK phone…
TgRAT Malware Attacking Linux Servers with New Variant
A new variant of the TgRAT malware, initially discovered in 2022 targeting Windows systems, has been observed attacking Linux servers. This evolution marks a significant shift in the malware’s capabilities, broadening its potential impact on a wider range of systems.…