Researchers discovered the spread of a malicious exe file that targets specific individuals and is disguised as information related to a personal data leak. The malware functions as a backdoor, executing obfuscated commands in XML format after receiving them from the threat actor. Because this…
Category: GBHackers on Security | #1 Globally Trusted Cyber Security News Platform
MrAnon Stealer Attacking Windows Users Via Weaponized PDF Files
Phishing emails targeting Windows users were discovered, tricking users into opening a malicious PDF file called “MrAnon Stealer” that spreads malware by using fake booking details. To obtain the final malware, the PowerShell script is executed by the PDF after…
Hackers Spy iPhone Users Using Malicious Keyboard Apps
A new method of keylogging using malicious keyboard apps has been discovered to affect iPhones, evading all Apple’s security detection procedures. Additionally, threat actors could also use this method to steal passwords, authentication codes, notes, private messages, etc., There have…
Over 50% of the Insider Attacks Uses Privilege Escalation Vulnerability
In the labyrinth of cybersecurity, the specter of insider threats emerges as a formidable adversary, wielding both malicious intent and unintentional foibles. This expose delves into the intricacies of how insiders exploit vulnerabilities, introducing an air of risk through actions…
How Smart Cars Are Spying You? Most important Privacy Concerns 2024
Privacy concerns related to smart cars primarily revolve around the extensive data collection, sharing, and potential misuse of personal information. Automobiles that are outfitted with artificial intelligence that is driven by systems are known as smart cars. They comprise numerous…
Crypto Exchange Founder Pleads Guilty for Dark Web Transfer
Bitzlato Ltd., a cryptocurrency exchange, was founded and is primarily owned by an individual who facilitated transactions between buyers and sellers in dark markets. The exchange acted as a conduit for such transactions to take place, making it an important…
Researchers Uncovered an Active Directory DNS spoofing exploit
In the intricate web of our interconnected world, the Domain Name System (DNS) stands as a linchpin, directing users to their online destinations. Yet, even this vital system is not impervious to the dark art of malicious manipulation. In a…
WordPress POP Chain Flaw Exposes Over 800M+ Websites to Attack
A critical remote code execution vulnerability has been patched as part of the WordPress 6.4.2 version. This vulnerability exists in the POP chain introduced in version 6.4, which can be combined with a separate Object Injection, resulting in the execution…
Russian Star Blizzard New Evasion Techniques to Hijack Email Accounts
Hackers target email accounts because they contain valuable personal and financial information. Successful email breaches enable threat actors to:- Cybersecurity researchers at Microsoft Threat Intelligence team recently unveiled that the Russian state-sponsored actor, Star Blizzard (aka SEABORGIUM, COLDRIVER, Callisto Group),…
Exploitation Methods Used by PlugX Malware Revealed by Splunk Research
PlugX malware is sophisticated in evasion, as it uses the following techniques to avoid detection by antivirus programs, making it challenging for security measures to identify and mitigate its presence:- That’s why PlugX malware stands out as a challenging and…
TA422 Hackers Attack Organizations Using Outlook & WinRAR Vulnerabilities
Hackers exploit Outlook and WinRAR vulnerabilities because these widely used software programs are lucrative targets. Outlook vulnerabilities offer:- WinRAR vulnerabilities provide an entry point to manipulate compressed files, potentially executing malicious code on a victim’s system. Cybersecurity researchers at Proofpoint…
Bluetooth keystroke-injection Flaw: A Threat to Apple, Linux & Android Devices
An unauthenticated Bluetooth keystroke-injection vulnerability that affects Android, macOS, and iOS devices has been discovered. This vulnerability can be exploited by tricking the Bluetooth host state machine into pairing with a fake keyboard without authentication. This vulnerability affects Android devices…
Atlassian Patches RCE Flaw that Affected Multiple Products
Atlassian has been discovered with four new vulnerabilities associated with Remote Code Execution in multiple products. The CVEs for these vulnerabilities have been assigned as CVE-2023-22522, CVE-2023-22523, CVE-2023-22524, and CVE-2022-1471. Atlassian has patched these vulnerabilities and has released security advisories…
SLAM Attack Gets Root Password Hash in 30 Seconds
Spectre is a class of speculative execution vulnerabilities in microprocessors that can allow threat actors unauthorized access to sensitive data. Hackers exploit Spectre because it enables them to extract confidential information by manipulating the speculative execution capabilities of CPUs, bypassing…
SLAM Attack Gets Root Password Hash in 30 Seconds by Exploiting Hardware Security
Spectre is a class of speculative execution vulnerabilities in microprocessors that can allow threat actors unauthorized access to sensitive data. Hackers exploit Spectre because it enables them to extract confidential information by manipulating the speculative execution capabilities of CPUs, bypassing…
Akira Ransomware Exploiting Zero-day Flaws For Organization Network Access
The Akira ransomware group, which first appeared in March 2023, has been identified as a serious threat to data security. It encrypts data and demands a ransom for decryption, affecting both Windows and Linux devices. The group has about 140…
Hackers Deliver AsyncRAT Through Weaponized WSF Script Files
The AsyncRAT malware, which was previously distributed through files with the .chm extension, is now being disseminated via WSF script format. The WSF file was found to be disseminated in a compressed file (.zip) format through URLs included in emails. AsyncRAT spreads…
Serpent Stealer Acquire Browser Passwords and Erases Intrusion Logs
Beneath the surface of the cyber realm, a silent menace emerges—crafted with the precision of the .NET framework, the Serpent Stealer slithers undetected through security measures, leaving traces of its intrusion. Researchers at K7 Labs have analyzed the malware called…
BlueNoroff: New Malware Attacking MacOS Users
Researchers have uncovered a new Trojan-attacking macOS user that is associated with the BlueNoroff APT group and their ongoing RustBucket campaign. As a subgroup of Lazarus, BlueNoroff possesses reverse engineering expertise because they spend time analyzing and patching SWIFT Alliance software as well…
Doppelgänger: Hackers Employ AI to Launch Highly sophistication Attacks
It has been observed that threat actors are using AI technology to conduct illicit operations on social media platforms. These malicious actors employ several tactics and automated bots to achieve their nefarious goals, which can pose a serious threat to…