More than two million Android users have been tricked into installing a set of malicious, phishing, and advertising apps via the Google Play store. Dr. Web antivirus discovered that these apps were disguised as essential utilities and system optimizer tools.…
Tag: GBHackers – Latest Cyber Security News | Hacker News
A New Linux Flaw Lets Attackers Gain Full Root Privilege
The Threat Research Unit at Qualys’ has revealed how a new Linux flaw tracked as (CVE-2022-3328), may be combined with two other, seemingly insignificant flaws to gain full root rights on a compromised system. The Linux snap-confine function, a SUID-root…
New Android Malware Stolen Facebook Credentials From 300,000 Victims
The mobile security firm Zimperium has recently issued a warning about a Trojan called “Schoolyard Bully,” which is actively masquerading as an educational application in a malicious threat campaign. While this trojan “Schoolyard Bully” has been active since 2018, and…
Google Chrome High-Severity Zero-Day Flaw Exploited in The Wild – Emergency Patch!!
In response to the active exploit of an open high-severity zero-day vulnerability (CVE-2022-4262) in the Chrome web browser, Google has released an emergency security patch to address the issue. Actively exploited Chrome zero-day vulnerability that allows attackers to execute an…
How Visibility on Software Supply Chain Can Reduce Cyberattacks
With cyberattacks cropping up in several tech sectors today, there is rightly more focus on monitoring software supply chains in the SDLC than ever before. When SolarWinds was hacked in 2020, the event sent shockwaves across the software industry. Although…
‘Black Panthers’ – A SIM Swap Gang Connected With Dark Web Got Arrested
Spanish National Police arrested the notorious SIM-swapping gang operating under the name “Black Panthers” for various cyber crimes. The law enforcement agents arrested 55 people, including the leader heading this Black Panthers gang. The operators behind this Black Panthers committed the bank…
Beware that Hackers Using Malicious USB Devices to Deliver Multiple Malware
Recently, Mandiant Managed Defense discovered cyber espionage activity that focuses on the Philippines and mainly uses USB drives as an initial infection vector. This operation, which Mandiant tracks as ‘UNC4191’, has a connection to China. The report states that operations of…
Accidental Syntax Error Leads to Kill The Cryptomining botnet Malware “KmsdBot”
It turns out that Akamai’s team of researchers accidentally killed a newly discovered cryptocurrency mining botnet known as KmsdBot during the investigation. Due to a syntax error, the botnet was unable to send commands any longer, and as a result,…
Google Found a Framework Used to Exploit Zero-Days in Chrome, Firefox, & Windows
A trio of newly discovered exploit frameworks has been detailed by Google’s Threat Analysis Group (TAG) in a recent publication. In the last few years, these exploit frameworks have been exploited as zero-day vulnerabilities by exploiting: There were three separate…
Top 6 Best IP Geolocation APIs For Cybersecurity – 2023
IP geolocation services are capable of far more than serving website visitors in their local language and currency using IP lookup. They can also play a critical role in cybersecurity. Geolocation data can source the IP address of DDoS (Distributed…
Google Uncovers the Framework Used to Exploit Zero-Days in Chrome, Firefox, & Windows
A trio of newly discovered exploit frameworks has been detailed by Google’s Threat Analysis Group (TAG) in a recent publication. In the last few years, these exploit frameworks have been exploited as zero-day vulnerabilities by exploiting: There were three separate…
LastPass Hacked – Attackers Breached Cloud Storage & Access Customer Data
Using data from the August 2022 incident, LastPass experienced a breach of user information within a third-party cloud storage service. LastPass is a freemium Android password manager that simply collects encrypted passwords online, and LogMeIn, Inc. obtained the LastPass in…
RCE Bug in Android Remote Keyboard Apps With 2M Downloads Let Hackers Access keystrokes
Multiple critical vulnerabilities were found by the security researchers at Synopsys in three Android apps that enable users to control computer systems with Android devices. Furthermore, these critical vulnerabilities could be exploited by threat actors to expose key presses and…
10 Best Vulnerability Scanning Tools For Penetration Testing – 2023
A Vulnerability Scanning Tool is one of the essential tools in IT departments Since vulnerabilities pop up every day and thus leaving a loophole for the organization. The Vulnerability scanning tools help in detecting security loopholes in the application, operating…
TikTok’s ‘Invisible Challenge’ Abused by Hackers To Install Dangerous Malware
Cybersecurity analysts at Checkmarx affirmed that a popular TikTok challenge is being used by hackers to trick people into downloading malicious software that steals private information from them. Currently, the #invisiblefilter tag of this challenge has accumulated over 25 million…
Dell, HP, & Lenovo System Found Using Outdated OpenSSL Cryptographic Library
The cybersecurity researchers at Binarly recently discovered that outdated versions of the OpenSSL cryptographic library are still being used by the following companies on their devices:- OpenSSL cryptographic library versions that are outdated provide a risk to the supply chain…
Chrome Zero-Day Bug Actively Exploited in the Wild – Google Emergency Update!
The eighth zero-day vulnerability used in attacks this year has been fixed by Google in an emergency security upgrade for the desktop version of the Chrome web browser. This high-severity zero-day vulnerability is tracked as CVE-2022-4135, a Heap buffer overflow…
Chrome Zero Day Bug Actively Exploited in the Wild – Google Emergency Update!
The eighth zero-day vulnerability used in attacks this year has been fixed by Google in an emergency security upgrade for the desktop version of the Chrome web browser. This high-severity zero-day vulnerability is tracked as CVE-2022-4135, a Heap buffer overflow…
Operation HAECHI III – INTERPOL Arrested 1000 Cyber Criminals & Seized $130 Million
Recently, there have been almost 1000 arrests made as a result of a police operation conducted by INTERPOL in an attempt to combat online fraud. As a result of this operation, Interpol recovered virtual assets worth USD 129,975,440. Between June…
Hackers Rewritten The RansomExx Ransomware in Rust Language To Evade Detection
There has recently been a discovery made by IBM Security X-Force Threat Researchers regarding a new variant of ransomware known as RansomExx that is dubbed RansomExx2 which was written in Rust language. While threat actor behind this malware is known…
Web Application Penetration Testing Checklist – A Detailed Cheat Sheet
Web Application Pentesting is a method of identifying, analyzing and Report the vulnerabilities which are existing in the Web application including buffer overflow, input validation, code Execution, Bypass Authentication, SQL Injection, CSRF, Cross-site scripting in the target web Application which…
Chrome Extension Deploy Windows Malware to Steal Cryptocurrency and Clipboard Contents
In order to steal cryptocurrency and clipboard contents, ViperSoftX was detected by the security analysts at Avast, a Windows malware that is using a Google Chrome extension called VenomSoftX. A JavaScript-based RAT and crypto-hijacker are hidden within this Chrome extension…
Google Released Over 165 YARA Rules to Detect Cobalt Strike Components in Their Networks
There is a collection of IOCs from VirusTotal and YARA Rules that has been recently open-sourced by the Google Cloud Threat Intelligence team. As a result, Google has taken this step to make it easier for security researchers to catch…
Hackers Use New Ransomware that Encrypts Files & Steals Tokens From Victim’s Machine
Security researchers at Cyble recently identified that the authors of ransomware now have access to a brand new malicious tool – AXLocker – which has the ability to encrypt and make the multitude of file types unusable. As one of…
Chinese Hackers Using 42,000 Phishing Domains To Drop Malware On Victims Systems
An extensive phishing campaign targeting businesses in numerous upright markets, including retail, was discovered by Cyjax recently in which the attackers exploited the reputation of renowned brands, and this includes the following business sectors:- Fangxiao is a group classified as…
High-Severity RCE Bug in F5 Products Let Attackers Hack the Complete Systems
Experts from Rapid7 observed a customized CentOS installation operating on F5 BIG-IP and BIG-IQ devices found to have various vulnerabilities. While the other flaws are security bypass methods that F5 does not consider vulnerabilities, two of the vulnerabilities have been…
Hundreds of Amazon RDS Instances Leaking User’s Personal Data
Recently, the Mitiga Research Team found that hundreds of databases each month were exposed, with significant Personally Identifiable Information (PII) leakage. An analysis found that the reputable Amazon Relational Database Service is leaking PII through exposed Relational Database Service (RDS)…
U.S. Federal Network Hacked – Iranian APT Hackers Compromised Domain Controller
Recently, the FBI and CISA published a joint advisory in which they disclosed an Iranian APT group compromised the Federal Civilian Executive Branch (FCEB) organization network Domain controller by exploiting the Log4Shell RCE flaw (CVE-2021-44228) to deploy XMRig crypto-mining malware…
Google to Pay $391M Fine for Android User Location Tracking Practices
To settle a privacy lawsuit brought by a group of attorneys general from 40 different U.S. states, Google has agreed to pay $391.5 million. Reports say U.S. Michigan will earn close to $12 million from the settlement, which is the…
KmsdBot – A Malware Written in Golang Infects Via SSH To Perform DDoS Attack
Recently, a new piece of evasive malware has been discovered that is able to gain entry into enterprise systems in order to mine cryptocurrency by exploiting a key internet-facing protocol. Researchers have discovered that the malware is capable of launching…
Massive Black Hat Malware Infect 2500 Websites By Injecting Malicious JavaScript
Recently, the cybersecurity researchers of Sucuri have found that threat actors are conducting a tremendous massive black hat search engine optimization (SEO) campaign. However, nearly 15,000 websites redirected visitors to participate in fake Q&A discussion forums in this campaign. Over…
High-Severity RCE Bug in F5 Products Let Attackers Hack the Complete Systems
Experts from Rapid7 observed a customized CentOS installation operating on F5 BIG-IP and BIG-IQ devices found to have various vulnerabilities. While the other flaws are security bypass methods that F5 does not consider vulnerabilities, two of the vulnerabilities have been…
Hundreds of Amazon RDS Instances Leaking User’s Personal Data
Recently, the Mitiga Research Team found that hundreds of databases each month were exposed, with significant Personally Identifiable Information (PII) leakage. An analysis found that the reputable Amazon Relational Database Service is leaking PII through exposed Relational Database Service (RDS)…
Researchers Discovered High-Severity Remote Code Execution Bug in F5 Products
Experts from Rapid7 observed a customized CentOS installation operating on F5 BIG-IP and BIG-IQ devices found to have various vulnerabilities. While the other flaws are security bypass methods that F5 does not consider vulnerabilities, two of the vulnerabilities have been…
Hackers Hiding Malware Behind The PNG Images Using Steganography
The Worok threat infects victims’ computers with information-stealing malware by concealing malware within PNG images with the help of the Steganography technique, which makes it very difficult to detect by malware scanners. The finding has substantiated one of the most…
Beware! Massive YouTube Campaign Aimed to Steal Login Credentials
There was an extensive phishing campaign that took advantage of YouTube as a vehicle for promoting the download and installation of cracked software and free games. In this campaign, attackers are abusing video tutorial that has the intention of tricking…
Researchers Discovered Hundreds of Amazon RDS Instances Leaking User Personal Data
Recently, the Mitiga Research Team found that hundreds of databases each month were exposed, with significant Personally Identifiable Information (PII) leakage. Particularly, the analysis found that the reputable Amazon Relational Database Service is leaking PII through exposed Relational Database Service…
Google to Pay $391M Fine for Android User Location Tracking Practices
To settle a privacy lawsuit brought by a group of attorneys general from 40 different U.S. states, Google has agreed to pay $391.5 million. Reports say U.S. Michigan will earn close to $12 million from the settlement, which is the…
KmsdBot – A Malware Written in Golang Infects Via SSH To Perform DDoS Attack
Recently, a new piece of evasive malware has been discovered that is able to gain entry into enterprise systems in order to mine cryptocurrency by exploiting a key internet-facing protocol. Researchers have discovered that the malware is capable of launching…
Massive Black Hat Malware Infect 2500 Websites By Injecting Malicious JavaScript
Recently, the cybersecurity researchers of Sucuri have found that threat actors are conducting a tremendous massive black hat search engine optimization (SEO) campaign. However, nearly 15,000 websites redirected visitors to participate in fake Q&A discussion forums in this campaign. Over…
Hackers Hiding Malware Behind The PNG Images Using Steganography
The Worok threat infects victims’ computers with information-stealing malware by concealing malware within PNG images with the help of the Steganography technique, which makes it very difficult to detect by malware scanners. The finding has substantiated one of the most…
Beware! Massive YouTube Campaign Aimed to Steal Login Credentials
There was an extensive phishing campaign that took advantage of YouTube as a vehicle for promoting the download and installation of cracked software and free games. In this campaign, attackers are abusing video tutorial that has the intention of tricking…
Malware Spotted on the Google Play Store Steals Banking Credentials & Intercepts SMS Messages
The Zscaler ThreatLabz team found the ‘Xenomorph’ banking trojan embedded in a Lifestyle app in the Google Play store. The app’s name is “Todo: Day manager,” and has more than 1,000 downloads. The trojan called ‘Xenomorph’ steals login information from…
Google Pixel Lock Screen Bypass Let Attacker Unlock the Screen Without PIN
A lock screen bypass vulnerability that affects all Pixel phones has been discovered by an ethical hacker. On his Pixel 6, David Schutz discovered a troublesome problem. The hacker, however, thinks that every Pixel phone possesses a flaw. Nevertheless, a…
Over 15,000 Websites were Hacked to Redirect Visitors to Fake Q&A Websites
Sucuri observed hackers compromising around 15,000 websites as part of a huge black hat SEO campaign in order to redirect visitors to fake Q&A discussion boards. “Our research team has tracked a surge in WordPress malware redirecting website visitors to…