Tag: CySecurity News – Latest Information Security and Hacking Incidents

The Unheard Story of a Crippling Ransomware

When did the attack surface? Rob Miller first learned there was a problem on a Sunday morning in mid-October 2020. The databases and IT systems at Hackney Council in East London suffered from outrages. During the time, the UK was…

Britain Government With Robust Crypto Regulation

The department of Britain’s finance ministry came with robust regulations for crypto assets, following the collapse of the crypto exchange FTX last year in which millions of people lost billions of dollars.  However, regulation of crypto-assets could create a one-sized…

North Korean Cybercriminals Attempt to Steal $27M in ETH

Hacking organizations ‘Lazarus’ and ‘APT38’ supported by the North Korean government were responsible for the loss of $100 million worth of Ethereum from Harmony Horizon in June 2022.  The funds and the seizure of stolen assets were reported to the…

Northern European Criminals Copy the Lockbit Gang

  The threat group, known as LockBit, is one of the most notorious ransomware groups operating currently. As a result, they have become very active on dark web forums. In addition, they are exploiting the negative publicity created by other…

Titan-Stealer: A New Golang-based Info-Stealer Malware

Recently, a new Golang-based information stealer malware, named ‘Titan Stealer’ is being promoted by threat actors in their Telegram channel. Initial details regarding the malware were discovered by cybersecurity researcher Will Thomas in November 2022 by using the IoT search…

Influence of Digitalization on IT Admins

A SaaS software business named SysKit has released a report on the impact of digital transformation on IT administrators and the present governance environment. According to the report, 40% of businesses experienced a data breach in the last year. This…

Specifically, Targeted VMware RCE Vulnerabilities

  As of today, VMware’s vRealize Log Insight platform is vulnerable to three security vulnerabilities, that have been exposed by publicly available exploit code. This has enabled cybercriminals to weaponize these vulnerabilities in a variety of ways. Several critical unauthenticated…

Privacy Assistant Jumbo Reinvents Itself

  Jumbo, which debuted in 2019, made a promise to make the process of securing and safeguarding your privacy easier.  The iPhone and Android software would enhance your privacy settings on websites like Facebook and LinkedIn with a few touches,…

ChatGPT: When Cybercrime Meets the Emerging Technologies

The immense capability of ChatGPT has left the entire globe abuzz. Indeed, it solves both practical and abstract problems, writes and debugs code, and even has the potential to aid with Alzheimer’s disease screening. The OpenAI AI-powered chatbot, however, is…

Qwant or DuckDuckGo: Which Search Engine is More Private?

Qwant and DuckDuckGo are two privately-focused search engines that guarantee not to track your activities. Their ability to assist you in avoiding the privacy-invading methods that are all too prevalent among big search engines is one of the key components…

Password Changes are Required for LastPass Customers

  Despite being one of the most popular password managers on the market, LastPass has suffered another major breach, putting the passwords of customers risk as well as their personal information.   It was established just over a year ago that…

FBI Takes Down the Infamous Ransomware Gang’s Website

  In a statement last week, the US Department of Justice claimed to have made progress against the significant ransomware organisation known as Hive.  Since last July, the FBI has been infiltrating Hive’s computer networks, and its disruption of the…

The Cybercrime Ecosystem Knits a Profitable Underground Gig Economy

  Over a 30-month period, cybercriminal groups and threat groups advertised for workers with expertise in software development, IT infrastructure maintenance, and designing fraudulent websites and email campaigns. In accordance with a new report from cybersecurity firm Kaspersky, demand for…

JD Sports: Data of 10 Million Customers at Risk

Following a cyber-attack, sportswear chain JD Sports has confirmed that the stored data of around 10 million customers might be at risk. The company said data that “may have been accessed” by the threat actors included names, addresses, email accounts,…

Here’s How to Avoid Reddit Frauds

  Reddit is the place to go if you want to find a community that shares your interests, whether you want to read the news, speak about your hobby, ask for advice, or debate your favourite band. But if you…

Bitwarden Users Attacked via Malicious Google Ads

Utilizing Google to look up the vendor’s official Web vault login page, several customers of Bitwarden’s password management service last week reported seeing paid advertising to phishing sites that steal credentials. Google ads targeting Bitwarden users Several password managers are…

How ChatGPT Could Drive A Viral Crypto Narrative

AI Crypto: The next big thing  AI crypto tokens will surely be the next big thing in the industry, an image of Metaverse mania, Defi boom, or meme coin explosion.  ChatGPT and other AI-based technologies have been viral across social…

Russia Blocked Encrypted Email Startup Skiff

Recently, the government of Russia blocked another encrypted email provider Skiff. The government blocked Skiff after exactly three years when it had blocked similar email encrypted services including Proton Mail and Tutanota, according to a Russian digital rights organization and…

The Unheard Story of a Crippling Ransomware

When did the attack surface? Rob Miller first learned there was a problem on a Sunday morning in mid-October 2020. The databases and IT systems at Hackney Council in East London suffered from outrages. During the time, the UK was…

North Korean Cybercriminals Attempt to Steal $27M in ETH

Hacking organizations ‘Lazarus’ and ‘APT38’ supported by the North Korean government were responsible for the loss of $100 million worth of Ethereum from Harmony Horizon in June 2022.  The funds and the seizure of stolen assets were reported to the…

Northern European Criminals Copy the Lockbit Gang

  The threat group, known as LockBit, is one of the most notorious ransomware groups operating currently. As a result, they have become very active on dark web forums. In addition, they are exploiting the negative publicity created by other…

Titan-Stealer: A New Golang-based Info-Stealer Malware

Recently, a new Golang-based information stealer malware, named ‘Titan Stealer’ is being promoted by threat actors in their Telegram channel. Initial details regarding the malware were discovered by cybersecurity researcher Will Thomas in November 2022 by using the IoT search…

Qwant or DuckDuckGo: Which Search Engine is More Private?

Qwant and DuckDuckGo are two privately-focused search engines that guarantee not to track your activities. Their ability to assist you in avoiding the privacy-invading methods that are all too prevalent among big search engines is one of the key components…

Password Changes are Required for LastPass Customers

  Despite being one of the most popular password managers on the market, LastPass has suffered another major breach, putting the passwords of customers risk as well as their personal information.   It was established just over a year ago that…

FBI Takes Down the Infamous Ransomware Gang’s Website

  In a statement last week, the US Department of Justice claimed to have made progress against the significant ransomware organisation known as Hive.  Since last July, the FBI has been infiltrating Hive’s computer networks, and its disruption of the…

ISC Issues Security Updates to Address New BIND DNS Software Bugs

  The Internet Systems Consortium (ISC) has issued updates to address multiple security flaws in the Berkeley Internet Name Domain (BIND) 9 Domain Name System (DNS) software suite, which could result in a denial-of-service (DoS) condition.  According to its website,…

A Six-Step Guide to Preventing Cyber Security Breaches

  As a business owner, you should be aware that cyberattacks are inevitable and that breaches may occur at any time. It’s a motivating factor for companies to plan so that cyber resilience and business recovery become an integral part…

Evolution of Gootkit Malware Using Obfuscations

Mandiant Managed Defense has reliably resolved GOOTLOADER infections since January 2021. When spreading GOOTLOADER, malicious actors cast a wide net, affecting a variety of industrial verticals and geographical areas. Gootkit Malware The Gootkit Trojan is Javascript-based malware that carries out…

Government Issues High-risk Warning for iPhone Users

  Apple iPhones are known for their strength and security features. The Cupertino-based tech behemoth releases security updates for its devices on a regular basis. Although Apple recommends that people install the most recent builds of iOS on their iPhones…

Riot Games Hit by Data Breach

Riot Games reported last week that a social engineering attempt had infiltrated the systems in their software platform. Motherboard got the ransom note that was sent to Riot Games and reported that hackers demanded $10 million in exchange for keeping…

DOJ Reveals: FBI Hacked Hive Ransomware Gang

The U.S. Department of Justice (DOJ) recently confirmed that the FBI has infiltrated the activities of a popular cyber-crime gang, covertly disrupting their hacking attacks for more than six months.  According to DOJ, FBI gained deep access to the Hive…

Aurora Infostealer Malware Uses Shapeshifting Techniques

  One of the most recent discoveries was the Aurora Stealer malware, which imitated popular applications in order to infect as many users as possible. Cyble researchers discovered that threat actors are actively changing and customizing their phishing websites in…

Critical CryptoAPI Spoofing Flaw in Windows PoC Exploit Released

  Proof-of-concept (Poc) code has been made available for a high-severity security vulnerability in the Windows CryptoAPI that Microsoft was notified of by the U.S. National Security Agency (NSA) and the U.K. National Cyber Security Centre (NCSC) last year.  The…

Take Steps to Protect Your Enterprise Against the Risks

  Earlier this month, the Apache Software Foundation announced that its log4j Java-based logging utility (CVE-2021-44228) had been vulnerable to a remote code execution vulnerability (CVE-2021-4428). It was rated a critical severity vulnerability by MITRE and given a CVSS score…

eSentire: Golden Chickens Malware’s Attacker Uncovered

The Threat Response Unit (TRU) of eSentire has been monitoring one of the most effective and covert malware families, Golden Chickens, for the past 16 months. The malware of choice for FIN6 and Cobalt, two of the most established and…

This New Python RAT Malware Targets Windows in Attacks

  A new Python-based malware has been discovered in the wild, with remote access trojan (RAT) capabilities that permit its operators to regulate the compromised systems. The new RAT, dubbed PY#RATION by researchers at threat analytics firm Securonix, communicates with…

North Korean Hackers Target Crypto Users with Phony Job Offers

  In an effort to commit cryptocurrency heists, North Korean hackers are exhibiting a “startup mentality,” according to a report released on Wednesday by cybersecurity company Proofpoint.  The Sunnyvale, California-based company claimed that in December, a group they call TA444,…

U.S. Targets Google’s Online Ad Business in Latest Lawsuit

The US Department of Justice (DOJ), along with eight other US states have filed a lawsuit against tech-giant Google. DOJ, on Tuesday, accused Google of abusing its dominance in the digital ad market.  It has threatened to dismantle a significant…

Source Code & Private Data Stolen From GoTo

GoTo, the parent company of LastPass, has disclosed that hackers recently broke into its systems and seized encrypted backups belonging to users. It claimed that in addition to LastPass user data, hackers managed to obtain data from its other enterprise…

Cyberwarfare Threat Looming Large on Firms Worldwide

  Over the past ten years or so, the environment for cyber threats has undergone a significant transformation, which has accelerated in recent years. The term “cyberwar” didn’t even exist until 30 years ago, and it’s still somewhat debatable today. …

Supply Chain Attacks Induced More Data Breaches than Malware

  As reported by the Identity Theft Resource Center, the first half of 2022 saw fewer compromises reported, owing in part to Russian-based cybercriminals being distracted by the war in Ukraine and volatility in cryptocurrency markets.  However, data compromises rose…

Linux Malware Records a New High in 2022

While more and more devices are adopting Linux as their operating system, the popularity of the software has nonetheless attracted cyber-criminals. According to recent reports, the number of malware aimed at the software increased dramatically in 2022.  As per the…

PayPal Users Should Check Their Accounts

  It seems that scammers never cease trying to con people. Keeping customers’ information private and secure is of the utmost importance to companies, so they use many ways to protect against a breach in their network.  Despite these digital…

LAUSD Computers are Breached via Cybercriminals

According to Los Angeles Unified School District (LAUSD), the second-largest school district in the U. S., the Vice Society ransomware group has stolen files containing private information, including Social Security Numbers, from contractors (SSNs). Additionally, LAUSD disclosed that the threat…

After a Vendor Hack, FanDuels Warns of a Data Breach

  A security breach has been detected at FanDuel’s sportsbook and betting site, which exposed customers’ names, email addresses, and payment information. This occurred in January 2023, when MailChimp’s security was breached. A security advisory urges users to be wary…

Mousetrapping: What is it & how to Safeguard Against it?

  Mousetrapping works in the identical way that a traditional mousetrap does: you unknowingly walk into a trap designed to keep you trapped for as long as possible. Operators who utilize mousetraps actively market their products or services. They may…

Cyber Thieves Target Retirement Accounts

Data security has become a priority for tax returns, credit cards, and other conventional targets of cyber criminals. Online thieves have recently been targeting employer retirement plans and the accounts in the plans.  Data security at retirement plans varies, and…

Ransomware Profits Shrink, as Victims Refuse to Pay

  As per data from blockchain analysis firm Chainalysis, ransomware revenue for 2022 has dropped from $765.6 million to at least $456.8 million, representing a -40.3% year-over-year drop. The number of attacks is as high as it has ever been,…

Phishing Scam Blank Image Masks Code in SVG Files

  Researchers from Avanan have seen the worldwide spread of a new threat known as ‘Blank Image,’ where hackers attach blank images to HTML messages. The user is instantly sent to a malicious URL once they open the attachment. Blank Image…

Malware Can Be Written With ChatGPT, as it Turns Out

  With its multi-talented AI chatbot, ChatGPT, the company now has another skill to add to its LinkedIn profile: it is capable of creating sophisticated “polymorphic” malware.  The chatbot from OpenAI has been reported as both skilled and resourceful when…

Security Vendors are Turning to GPT as a Key AI Technology

  A number of businesses are utilising conversational AI technology to improve their product capabilities, including for security, despite some concerns about how generative AI chatbots like ChatGPT can be used maliciously — to create phishing campaigns or write malware. …

Hackers Designs Malware for Recently Patched Fortinet Zero-Day Vulnerability

Researchers who recently disclosed and patched the zero-day vulnerability in Fortinet’s FortiOS SSL-VPN technology have identified a new backdoor, specifically created in order to run on Fortinet’s FortiGate firewalls.  Initial evidence collected by Google-owned security firm Mandiant suggests that the…

A Credential Stuffing Attack Breaches PayPal Accounts

  In December last year, hackers accessed the PayPal accounts of more than 1.6 million users of the online payment service. As a result, PayPal is now sending out data breach notifications to affected users.  A large number of customer…

Roaming Mantis Virus Features DNS Setups

Malicious actors linked to the Roaming Mantis attack group were seen distributing an updated variation of their patented mobile malware called Wroba to compromise Wi-Fi routers and perform Domain Name System (DNS) theft. Kaspersky found that the threat actor behind…

Blockchain: Is it hackable?

  Following high-profile blockchain hacks in the last year, many people have been left wondering: is the blockchain hackable? The short answer is that any system can be attacked. However, because blockchain is decentralized, hackers may find it more difficult…

DoControl: Growing its SaaS Security Platform

DoControl offers an integrated, automated, and risk-aware SaaS Security Platform that protects apps and data which are essential to corporate operations promotes operational efficiency and boosts productivity. Protecting data and business-critical SaaS apps through automated remediation is DoControl’s key strength.…

Bogus DHL Emails Enable Attackers to Hack Microsoft 365 Accounts

  As per experts, a new phishing campaign has been discovered that impersonates logistics giant DHL in order to steal Microsoft 365 credentials from victims in the education industry. Cybersecurity researchers from Armorblox recently found a significant phishing campaign, with…

Google Receives Sensitive Data From Abortion Pill Websites

  Several online pharmacies are selling abortion pills online and sharing their customers’ personal information, such as their search history and geolocation, with Google and other third parties. ProPublica has learned that by using this information, one can identify the…

Info-stealing Ads Spread by Malvertising

HP Wolf Security’s cybersecurity researchers have issued a warning about various ongoing activities that aim to use typosquatting domains and malicious advertising to spread different types of malware to unwitting victims. Additionally, the scammers paid various ad networks to broadcast…

Lazarus Moves More than $60 Million from Harmony Bridge Hack

North Korean state-owned threat actors Lazarus Group has stolen around 41,000 ETH or more than $60 million of Ethereum to the crypto exchanges Binance, Huobi and OKX. While Binance and Huobi both froze the funds, Binance declared that an asset…

Twitter: Five Changes to the Platform for Users by Elon Musk

  Three months have passed since Elon Musk stormed into Twitter’s San Francisco headquarters, and the company has barely escaped the spotlight. We’ve talked a lot about his thoughts on the social network and some of his more controversial business…

Rhadamanthys: Malware Hidden in Google Ads

Threat actors are establishing fraudulent websites for popular free and open-source software in order to promote malicious downloads via advertisements present in the Google search result.  The info-stealing malware Rhadamanthys uses Google advertisements as a means of luring people into…

Synthetic Identity Fraud: What Is It?

Frankenstein ID, the use of fake identities by scammers, has become prevalent over the last 12 to 18 months, with US financial institutions (FIs) reporting losses of $20 billion in 2021 as compared to $6 billion in 2016. Synthetic Identity…

Businesses are Furious Following the Royal Mail Export Chaos

  About 50 of the total orders that Sean Fothersgill, the proprietor of the model car retailer Pendle Slot Racing, receives each day come from outside the UK.  Those international orders have been sitting in a warehouse corner collecting dust…

Gen Digital Customers’ Accounts were Breached by Hackers

  A Norton LifeLock spokesperson has confirmed that malicious third parties are likely to have gained access to some customers’ accounts, possibly even gaining access to their password vaults.  The document describing affected customers’ rights as a result of a…

Microsoft Quietly Revealed a New Kind of AI

In the tangible future, humans will be interfacing their flesh with chips. Therefore, perhaps we should not have been shocked when Microsoft’s researchers appeared to have hastened a desperate future.  It was interestingly innocent and so very scientific. The headline…

Emails are Vulnerable to Cyber Threat

Small businesses and organizations of various sizes worldwide rushed to upload patches and assess what had been compromised. Hacks expose the vulnerability of the 32 million small businesses, which are largely unable to afford to work with cybersecurity firms and…