Tag: Threatpost

ChromeLoader Browser Hijacker Provides Gateway to Bigger Threats

This article has been indexed from Threatpost The malvertiser’s use of PowerShell could push it beyond its basic capabilities to spread ransomware, spyware or steal data from browser sessions, researchers warn. Read the original article: ChromeLoader Browser Hijacker Provides Gateway…

Critical Flaws in Popular ICS Platform Can Trigger RCE

This article has been indexed from Threatpost Cisco Talos discovered eight vulnerabilities in the Open Automation Software, two of them critical, that pose risk for critical infrastructure networks. Read the original article: Critical Flaws in Popular ICS Platform Can Trigger…

Cybergang Claims REvil is Back, Executes DDoS Attacks

This article has been indexed from Threatpost Actors claiming to be the defunct ransomware group are targeting one of Akami’s customers with a Layer 7 attack, demanding an extortion payment in Bitcoin. Read the original article: Cybergang Claims REvil is…

Zoom Patches ‘Zero-Click’ RCE Bug

This article has been indexed from Threatpost The Google Project Zero researcher found a bug in XML parsing on the Zoom client and server. Read the original article: Zoom Patches ‘Zero-Click’ RCE Bug

Fronton IOT Botnet Packs Disinformation Punch

This article has been indexed from Threatpost Fronton botnet has far more ability than launching DDOS attack, can track social media trends and launch suitable propaganda. Read the original article: Fronton IOT Botnet Packs Disinformation Punch

Closing the Gap Between Application Security and Observability

This article has been indexed from Threatpost Daniel Kaar, global director application security engineering at Dynatrace, highlights the newfound respect for AppSec-enabled observability in the wake of Log4Shell. Read the original article: Closing the Gap Between Application Security and Observability

380K Kubernetes API Servers Exposed to Public Internet

This article has been indexed from Threatpost More than 380,000 of the 450,000-plus servers hosting the open-source container-orchestration engine for managing cloud deployments allow some form of access. Read the original article: 380K Kubernetes API Servers Exposed to Public Internet

DOJ Says Doctor is Malware Mastermind

This article has been indexed from Threatpost The U.S. Department of Justice indites middle-aged doctor, accusing him of being a malware mastermind. Read the original article: DOJ Says Doctor is Malware Mastermind

Sysrv-K Botnet Targets Windows, Linux

This article has been indexed from Threatpost Microsoft researchers say they are tracking a botnet that is leveraging bugs in the Spring Framework and WordPress plugins. Read the original article: Sysrv-K Botnet Targets Windows, Linux

iPhones Vulnerable to Attack Even When Turned Off

This article has been indexed from Threatpost Wireless features Bluetooth, NFC and UWB stay on even when the device is powered down, which could allow attackers to execute pre-loaded malware. Read the original article: iPhones Vulnerable to Attack Even When…

Malware Builder Leverages Discord Webhooks

This article has been indexed from Threatpost Researchers discovered a simple malware builder designed to steal credentials, then pinging them to Discord webhooks. Read the original article: Malware Builder Leverages Discord Webhooks

Novel ‘Nerbian’ Trojan Uses Advanced Anti-Detection Tricks

This article has been indexed from Threatpost The stealthy, feature-rich malware has multistage evasion tactics to fly under the radar of security analysis, researchers at Proofpoint have found. Read the original article: Novel ‘Nerbian’ Trojan Uses Advanced Anti-Detection Tricks

Actively Exploited Zero-Day Bug Patched by Microsoft

This article has been indexed from Threatpost Microsoft’s May Patch Tuesday roundup also included critical fixes for a number of flaws found in infrastructure present in many enterprise and cloud environments. Read the original article: Actively Exploited Zero-Day Bug Patched…

Ransomware Deals Deathblow to 157-year-old College

This article has been indexed from Threatpost Why a private college that stayed in business for 157 years had to close after the combo of COVID-19 and ransomware proved too much. Read the original article: Ransomware Deals Deathblow to 157-year-old…

Low-rent RAT Worries Researchers

This article has been indexed from Threatpost Researchers say a hacker is selling access to quality malware for chump change. Read the original article: Low-rent RAT Worries Researchers

Podcast: The State of Secret Sprawl

This article has been indexed from Threatpost In this podcast with Mackenzie Jackson, developer advocate at GitGuardian, we dive into the report and also the issues that corporations face with public leaks from groups like Lapsus and more, as well…

Podcast: The State of the Secret Sprawl

This article has been indexed from Threatpost In this podcast with Mackenzie Jackson, developer advocate at GitGuardian, we dive into the report and also the issues that corporations face with public leaks from groups like Lapsus and more, as well…

USB-based Wormable Malware Targets Windows Installer

This article has been indexed from Threatpost Activity dubbed ‘Raspberry Robin’ uses Microsoft Standard Installer and other legitimate processes to communicate with threat actors and execute nefarious commands. Read the original article: USB-based Wormable Malware Targets Windows Installer

VHD Ransomware Linked to North Korea’s Lazarus Group

This article has been indexed from Threatpost Source code and Bitcoin transactions point to the malware, which emerged in March 2020, being the work of APT38, researchers at Trellix said. Read the original article: VHD Ransomware Linked to North Korea’s…

China-linked APT Caught Pilfering Treasure Trove of IP

This article has been indexed from Threatpost A state-sponsored threat actor designed a house-of-cards style infection chain to exfiltrate massive troves of highly sensitive data. Read the original article: China-linked APT Caught Pilfering Treasure Trove of IP

Bad Actors Are Maximizing Remote Everything

This article has been indexed from Threatpost Aamir Lakhani, global security strategist and researcher at FortiGuard Labs, zeroes in on how adversaries are targeting ‘remote everything’. Read the original article: Bad Actors Are Maximizing Remote Everything

Security Turbulence in the Cloud: Survey Says…

This article has been indexed from Threatpost Exclusive Threatpost research examines organizations’ top cloud security concerns, attitudes towards zero-trust and DevSecOps. Read the original article: Security Turbulence in the Cloud: Survey Says…

Cyberespionage APT Now Identified as Three Separate Actors

This article has been indexed from Threatpost The threat group known as TA410 that wields the sophisticated FlowCloud RAT actually has three subgroups operating globally, each with their own toolsets and targets. Read the original article: Cyberespionage APT Now Identified…

Cyberattacks Rage in Ukraine, Support Military Operations

This article has been indexed from Threatpost At least five APTs are believed involved with attacks tied ground campaigns and designed to damage Ukraine’s digital infrastructure. Read the original article: Cyberattacks Rage in Ukraine, Support Military Operations

Millions of Java Apps Remain Vulnerable to Log4Shell

This article has been indexed from Threatpost Four months after the critical flaw was discovered, attackers have a massive attack surface from which they can exploit the flaw and take over systems, researchers found. Read the original article: Millions of…

Firms Push for CVE-Like Cloud Bug System

This article has been indexed from Threatpost Researchers propose fresh approaches to cloud-security bugs and mitigating exposure, impact and risk. Read the original article: Firms Push for CVE-Like Cloud Bug System

Zero-Trust For All: A Practical Guide

This article has been indexed from Threatpost How to use zero-trust architecture effectively in today’s modern cloud-dependent infrastructures. Read the original article: Zero-Trust For All: A Practical Guide

Most Email Security Approaches Fail to Block Common Threats

This article has been indexed from Threatpost A full 89 percent of organizations experienced one or more successful email breaches during the previous 12 months, translating into big-time costs. Read the original article: Most Email Security Approaches Fail to Block…

Authorities Fully Behead Hydra Dark Marketplace

This article has been indexed from Threatpost The popular underground market traded in drugs, stolen data, forged documents and more — raking in billions in Bitcoin. Read the original article: Authorities Fully Behead Hydra Dark Marketplace

No-Joke Borat RAT Propagates Ransomware, DDoS

This article has been indexed from Threatpost This fresh malware strain extends the functionality of typical trojans with advanced functionality and a series of modules for launching various types of threat activity. Read the original article: No-Joke Borat RAT Propagates…

Apple Rushes Out Patches for 0-Days in MacOS, iOS

This article has been indexed from Threatpost The vulnerabilities could allow threat actors to disrupt or access kernel activity and may be under active exploit. Read the original article: Apple Rushes Out Patches for 0-Days in MacOS, iOS

QNAP Customers Adrift, Waiting on Fix for OpenSSL Bug

This article has been indexed from Threatpost QNAP is warning clients that a recently disclosed vulnerability affects most of its NAS devices, with no mitigation available while the vendor readies a patch. Read the original article: QNAP Customers Adrift, Waiting…

Google Chrome Bug Actively Exploited as Zero-Day

This article has been indexed from Threatpost The internet giant issued an update for the bug, which is found in the open-source V8 JavaScript engine. Read the original article: Google Chrome Bug Actively Exploited as Zero-Day

Lapsus$ ‘Back from Vacation’

This article has been indexed from Threatpost Lapsus$ added IT giant Globant plus 70GB of leaked data – including admin credentials for scads of customers’ DevOps platforms – to its hit list. Read the original article: Lapsus$ ‘Back from Vacation’

MSHTML Flaw Exploited to Attack Russian Dissidents

This article has been indexed from Threatpost A Ukrainian-based threat actor is spearphishing Russians who are using services that have been banned by the Kremlin. Read the original article: MSHTML Flaw Exploited to Attack Russian Dissidents

Exchange Servers Speared in IcedID Phishing Campaign

This article has been indexed from Threatpost The ever-evolving malware shows off new tactics that use email thread hijacking and other obfuscation techniques to provide advanced evasion techniques. Read the original article: Exchange Servers Speared in IcedID Phishing Campaign

Okta Says It Goofed in Handling the Lapsus$ Attack

This article has been indexed from Threatpost “We made a mistake,” Okta said, owning up to its responsibility for security incidents that hit its service providers and potentially its own customers. Read the original article: Okta Says It Goofed in…

UK Cops Collar 7 Suspected Lapsus$ Gang Members

This article has been indexed from Threatpost London Police can’t say if they nabbed the 17-year-old suspected mastermind & multimillionaire – but researchers say they’ve been tracking an Oxford teen since mid-2021. Read the original article: UK Cops Collar 7…

HubSpot Data Breach Ripples Through Crytocurrency Industry

This article has been indexed from Threatpost ~30 crypto companies were affected, including BlockFi, Swan Bitcoin and NYDIG, providing an uncomfortable reminder about how much data CRM systems snarf up. Read the original article: HubSpot Data Breach Ripples Through Crytocurrency…

Microsoft Help Files Disguise Vidar Malware

This article has been indexed from Threatpost Attackers are hiding interesting malware in a boring place, hoping victims won’t bother to look. Read the original article: Microsoft Help Files Disguise Vidar Malware

Tax-Season Scammers Spoof Fintechs Stash, Public

This article has been indexed from Threatpost Threat actors are impersonating such wildly popular personal-finance apps (which are used more than social media or streaming services) to try to fool people into giving up their credentials. Read the original article:…

Top 3 Attack Trends in API Security – Podcast

This article has been indexed from Threatpost Bots & automated attacks have exploded, with attackers and developers alike in love with APIs, according to a new Cequence Security report. Hacker-in-residence Jason Kent explains the latest. Read the original article: Top…

DeadBolt Ransomware Resurfaces to Hit QNAP Again

This article has been indexed from Threatpost A new steady stream of attacks against network-attached storage devices from the Taiwan-based vendor is similar to a wave that occurred in January. Read the original article: DeadBolt Ransomware Resurfaces to Hit QNAP…

Russia Lays Groundwork for Cyberattacks on US Infrastructure

This article has been indexed from Threatpost “Evolving intelligence” shows Russia amping up for cyber-war in response to Ukraine-related sanctions, the White House said — but researchers warn that many orgs are not prepared. Read the original article: Russia Lays…

Serpent Backdoor Slithers into Orgs Using Chocolatey Installer

This article has been indexed from Threatpost An unusual attack using an open-source Python package installer called Chocolatey, steganography and Scheduled Tasks is stealthily delivering spyware to companies. Read the original article: Serpent Backdoor Slithers into Orgs Using Chocolatey Installer

Conti Ransomware V. 3, Including Decryptor, Leaked

This article has been indexed from Threatpost The latest is a fresher version of the ransomware pro-Ukraine researcher ContiLeaks already released, but it’s reportedly clunkier code. Read the original article: Conti Ransomware V. 3, Including Decryptor, Leaked

Bridgestone Hit as Ransomware Torches Toyota Supply Chain

This article has been indexed from Threatpost A ransomware attack struck Bridgestone Americas, weeks after another Toyota supplier experienced the same and a third reported some kind of cyber hit. Read the original article: Bridgestone Hit as Ransomware Torches Toyota…