Enterprises Worry End Users Will be the Cause of Next Major Breach

February 16, 2024 at 05:04PM The increase in data breaches and cyberattacks has made these incidents more visible than ever. Security professionals are reconsidering their security strategies and investments due to heightened focus. Despite deploying various security tools, many organizations lack confidence in their ability to withstand attacks. The threat landscape is evolving, and the … Read more

Turla hackers backdoor NGOs with new TinyTurla-NG malware

February 15, 2024 at 10:03AM Security researchers discovered new malware known as TinyTurla-NG and TurlaPower-NG, being used by the Russian hacker group Turla. The group exploits vulnerable WordPress websites for command and control purposes. Targeting organizations across various sectors, they aim to steal sensitive data using custom tools and malware. The malware’s purpose is to … Read more

Turla hackers target NGOs with new TinyTurla-NG ‘secret backdoor’

February 15, 2024 at 09:56AM Security researchers have discovered new malware called TinyTurla-NG and TurlaPower-NG, utilized by the Russian hacker group Turla for network access and data theft. Turla exploits vulnerable WordPress websites for command and control, targeting organizations across various sectors. The malware’s backdoor functionality and data exfiltration methods were detailed in a report … Read more

Glupteba Botnet Evades Detection with Undocumented UEFI Bootkit

February 13, 2024 at 09:39AM Glupteba, a sophisticated information stealer and backdoor, has incorporated an undocumented UEFI bootkit feature, enhancing its stealth and persistence. The malware is capable of illicit cryptocurrency mining, proxy deployment, and various malicious activities. Distributed through complex infection chains, Glupteba demonstrates modern cybercriminals’ innovation, collaboration, and adaptation to evade detection. Based … Read more

Hunter-Killer Malware Tactic Growing: Stealthy, Persistent and Aggressive

February 13, 2024 at 12:33AM The ‘hunter-killer’ malware tactic, named after submarine warfare, has seen a significant rise and is expected to continue growing. This ultra-evasive and aggressive malware aims to evade detection and disable cybersecurity defenses, using techniques like process injection, command and scripting interpreter, and system information discovery. The report suggests a connection … Read more

Exposed Docker APIs Under Attack in ‘Commando Cat’ Cryptojacking Campaign

February 4, 2024 at 12:19PM A new cryptojacking campaign, Commando Cat, targets exposed Docker API endpoints with multiple payloads, including XMRig cryptocurrency miner. The sophisticated campaign utilizes Docker as an initial access vector, deploys benign containers, and runs various payloads. It also drops additional payloads from a command-and-control server, posing a multi-faceted threat. (Word count: … Read more

iShutdown scripts can help detect iOS spyware on your iPhone

January 17, 2024 at 01:07PM Security researchers discovered a method to detect spyware infections like Pegasus, Reign, and Predator on compromised Apple mobile devices by analyzing the Shutdown.log file. Kaspersky released Python scripts to automate this process and recommend regular device restarts to capture signs of infection. The method proved reliable in identifying spyware-related behaviors … Read more

21 New Mac Malware Families Emerged in 2023

January 3, 2024 at 07:42AM In 2023, 21 new malware families targeting macOS systems were discovered by security researcher Patrick Wardle, representing a 50% increase from 2022. Wardle’s blog post provides detailed analysis of each family’s characteristics and their potential impact on Apple devices. Notable threats include ransomware, infostealers, APT-developed malware, and variations of existing … Read more

Decoy Microsoft Word Documents Used to Deliver Nim-Based Malware

December 22, 2023 at 08:00AM A recent phishing campaign employs decoy Microsoft Word documents to distribute Nim-based malware. The backdoor lures victims to enable macros, then establishes a connection with a remote server disguised as a Nepali government entity. This comes amidst increased distribution of various malware strains and social engineering campaigns leveraging new tactics. … Read more

New Rhadamanthys stealer version enhances features, evasion

December 17, 2023 at 04:44PM The developers of Rhadamanthys malware have released two major versions, enhancing its information-stealing capabilities. Sold via subscription, it’s distributed through various channels. Check Point’s analysis of version 0.5.0 revealed a new plugin system, improved stub construction, and targeted crypto apps. Version 0.5.1 introduces a new Clipper plugin and other advanced … Read more