24 Feb Defense contractors hit by stealthy SockDetour Windows backdoor A new custom malware dubbed SockDetour found on systems belonging to US defense contractors has been used as a backup backdoor to maintain access to compromised networks. […]
24 Feb Ransomware used as decoy in data-wiping attacks on Ukraine The new data wiper malware deployed on Ukrainian networks in destructive attacks on Wednesday right before Russia invaded Ukraine earlier today was, in some cases, accompanied by a GoLang-based ransomware decoy. […]
24 Feb Malware infiltrates Microsoft Store via clones of popular games A malware named Electron Bot has found its way into Microsoft’s Official Store through clones of popular games such as Subway Surfer and Temple Run, leading to the infection of 5,000 computers in Sweden, Israel, Spain, and Bermuda. […]
23 Feb NSA-linked Bvp47 Linux backdoor widely undetected for 10 years A report released today dives deep into technical aspects of a Linux backdoor now tracked as Bvp47 that is linked to the Equation Group, the advanced persistent threat actor tied to the U.S. National Security Agency. […]
23 Feb Network hackers focus on selling high-value targets in the U.S. A Crowdstrike report looking into access brokers’ advertisements since 2019 has identified a preference in academic, government, and technology entities based in the United States. […]
23 Feb New data-wiping malware used in destructive attacks on Ukraine Cybersecurity firms have found a new data wiper used in destructive attacks today against Ukrainian networks just as Russia moves troops into regions of Ukraine. […]
23 Feb Ransomware extortion doesn’t stop after paying the ransom A global survey that looked into the experience of ransomware victims highlights the lack of trustworthiness of ransomware actors, as in most cases of paying the ransom, the extortion simply continues. […]
23 Feb Nigerian hacker pleads guilty to stealing payroll deposits A Nigerian national named Charles Onus has pled guilty in the District Court of the Southern District of New York to hacking into a payroll company’s user accounts and stealing payroll deposits. […]
22 Feb Devious phishing method bypasses MFA using remote access software A devious new phishing technique allows attackers to bypass MFA by secretly having victims log in to their accounts directly on attacker-controlled servers using VNC. […]
22 Feb Google Chrome to allow users to add notes to saved passwords Google is testing a new Chrome feature that allows users to add notes on passwords saved in the web browser. […]