Articles tagged "Google"

Found 52 articles

Actively Exploited

The latest Security Affairs Malware newsletter covers several significant malware threats that have emerged recently. Notably, a group identified as Stan Ghouls is targeting users in Russia and Uzbekistan using the NetSupport Remote Access Trojan (RAT), which allows attackers to control infected systems remotely. Another concerning development is the discovery of ZeroDayRAT, a new spyware designed to infiltrate both Android and iOS devices. Additionally, researchers have uncovered a Linux botnet named SSHStalker, which utilizes old-school IRC methods to compromise new victims. These activities demonstrate the evolving tactics of cybercriminals and emphasize the need for users and organizations to remain vigilant against these persistent threats.

Impact: NetSupport RAT, ZeroDayRAT (Android and iOS), SSHStalker Linux Botnet
Remediation: Users should implement security updates, monitor network activity for unusual behavior, and utilize endpoint protection solutions to mitigate these threats.
Read Original
287 Chrome Extensions Caught Harvesting Browsing Data from 37M Users

Hackread – Cybersecurity News, Data Breaches, AI and More

Actively Exploited

A recent investigation by Q Continuum has uncovered that 287 Chrome extensions are leaking private browsing data from approximately 37.4 million users to companies like Similarweb and Alibaba. These extensions, often perceived as harmless tools, have been found to convert users' browsing histories into marketable products. The data breach raises significant privacy concerns, particularly for users who may not be aware that their online activities are being monitored and sold. This incident highlights the need for users to be vigilant about the extensions they install and the permissions they grant. As these extensions may not seem malicious at first glance, it serves as a reminder of the potential risks associated with browser add-ons.

Impact: Chrome extensions, user browsing data
Remediation: Users should review and remove any unnecessary or suspicious Chrome extensions and check their permissions. Regularly monitoring browser settings and being cautious about the extensions installed is advisable.
Read Original

A newly identified hacking group, suspected to be linked to Russian intelligence, has launched attacks against various Ukrainian sectors, including defense, government, and energy. This group is using a malware called CANFAIL, which was uncovered by researchers from Google Threat Intelligence Group. The targeting of critical infrastructure and military entities raises significant concerns about national security and the ongoing conflict in the region. As these attacks could disrupt essential services and information systems, the situation highlights the need for enhanced cybersecurity measures among the affected organizations. This incident is part of a broader pattern of cyber warfare tactics being employed against Ukraine.

Impact: Ukrainian defense, government, and energy sectors
Remediation: Organizations should enhance cybersecurity protocols, conduct regular security assessments, and ensure timely updates and patches to their systems.
Read Original

The article discusses various cybersecurity topics, including vulnerabilities in software and tools used by organizations. It mentions issues related to the Chrome browser and System Center Configuration Manager (SCCM), suggesting that users should stay updated to protect against potential exploits. Additionally, it brings attention to a tool named SSHStalker, which appears to be associated with security risks. The piece emphasizes the importance of maintaining software updates and being aware of the tools in use, as attackers often target widely used applications to compromise systems. Overall, the article serves as a reminder for users and organizations to remain vigilant about their cybersecurity practices.

Impact: Chrome browser, System Center Configuration Manager (SCCM), SSHStalker
Remediation: Users should ensure that their software is updated to the latest versions and consider applying any available patches.
Read Original

A recent security audit conducted by Google and Intel has uncovered a serious vulnerability in the Trusted Execution Environment (TDX) that could allow attackers to fully compromise affected systems. This issue affects various products utilizing TDX technology, which is designed to enhance security by isolating sensitive data. The discovery of this vulnerability raises significant concerns for organizations relying on TDX for data protection, as it could lead to unauthorized access and data breaches. Companies using affected systems should prioritize investigation and remediation efforts to safeguard their environments. As of now, there is no indication of this vulnerability being actively exploited in the wild, but the potential for future attacks remains a pressing concern.

Impact: Products utilizing TDX technology, specific vendors and systems not specified
Remediation: Companies should investigate and apply necessary patches or updates as they become available to mitigate the vulnerability.
Read Original

Researchers have identified a new spyware kit called ZeroDayRAT, which is being distributed via Telegram. This toolkit is said to allow attackers to fully compromise both iOS and Android devices, functioning at a level typically associated with resources available to nation-states. The implications of this spyware are significant, as it can potentially give hackers complete access to personal data and device controls. Users of mobile devices, especially those who may be targeted for sensitive information, should be particularly cautious. The emergence of such advanced tools raises serious concerns about mobile security and privacy.

Impact: iOS and Android devices
Remediation: Users should ensure their devices are updated with the latest security patches and be cautious about downloading unknown apps or clicking on suspicious links.
Read Original

Recent research reveals that nearly half of Chrome AI extensions are collecting user data without proper consent. Tools focused on coding, transcription, and productivity seem to be the worst offenders, raising significant privacy concerns for users. This issue could affect anyone using these extensions, as they often require extensive permissions to function. The findings suggest that many users may unknowingly expose their personal information to third parties through these seemingly helpful tools. As the use of AI technology grows, it’s crucial for users to be aware of what data they are sharing and how it might be used.

Impact: Chrome AI extensions, particularly those related to coding and transcription
Remediation: Users should review the permissions requested by extensions and consider removing those that ask for excessive data access. Regularly checking for updates and only using trusted extensions can also help mitigate risks.
Read Original

Recent vulnerabilities in Google Looker have raised serious concerns about security, particularly regarding cross-tenant remote code execution (RCE) and data exfiltration. Attackers could exploit these flaws to gain access to environments of other Google Cloud Platform (GCP) tenants by leveraging a compromised Looker user account. This means that sensitive data from multiple organizations could potentially be at risk, making it a significant threat for businesses relying on GCP services. The findings underscore the need for users and companies to review their security practices and ensure that they are protected against unauthorized access. As vulnerabilities like these can lead to major data breaches, prompt action is essential to safeguard sensitive information.

Impact: Google Looker, Google Cloud Platform (GCP)
Remediation: Users should review their access controls and monitor for unusual activity. Google may release patches or updates, but specific remediation steps are not detailed.
Read Original
Actively Exploited

Bitdefender has identified a new Android malware campaign that uses Hugging Face, a platform typically associated with artificial intelligence and machine learning. This malware, classified as a Remote Access Trojan (RAT), is designed to gain unauthorized access to Android devices, potentially compromising user data and privacy. The campaign raises concerns as it exploits a legitimate platform to distribute malicious software, making it harder for users to detect the threat. Users of Android devices should be particularly cautious and ensure they download apps only from trusted sources to avoid falling victim to this malware. The implications are significant, especially for those who may unknowingly install infected applications, leading to data theft or device control by attackers.

Impact: Android devices, Hugging Face platform
Remediation: Users should only download apps from official app stores and be cautious about granting permissions to applications.
Read Original

Google, in collaboration with other partners, has successfully disrupted IPIDEA, one of the largest residential proxy networks globally. This action involved legal measures to shut down multiple domains that facilitated the control of devices and the routing of proxy traffic. As a result, the IPIDEA website is currently inaccessible, signaling a significant blow to the operations of this network. The disruption of IPIDEA is important because residential proxy networks can be exploited for various malicious activities, including data scraping and evading detection in cyberattacks. This move highlights ongoing efforts to combat such networks that can compromise user privacy and security.

Impact: Residential proxy networks, IPIDEA domains
Remediation: N/A
Read Original

ESET researchers have uncovered a spyware campaign targeting individuals in Pakistan that employs romance scam tactics. This operation uses a malicious app masquerading as a chat service, which facilitates conversations through WhatsApp but primarily serves to steal data from infected devices. The malware is identified as GhostChat, and it appears to be part of a larger surveillance effort by the same threat actor. This incident is particularly concerning as it exploits personal relationships and trust, potentially affecting many unsuspecting users who are seeking companionship online. The implications of such spyware are significant, as it not only compromises personal data but also raises issues of privacy and security in digital communications.

Impact: Android devices, GhostChat malware
Remediation: Users should avoid downloading apps from untrusted sources and be cautious of any application promising to facilitate communication with potential romantic partners. Regularly updating device software and using security solutions can also help mitigate risks.
Read Original

A new malware toolkit called 'Stanley' is being sold on cybercrime forums for between $2,000 and $6,000. This toolkit enables attackers to create counterfeit websites that mimic legitimate ones, facilitating phishing attacks. The post claims that the toolkit can publish these fraudulent sites on the Chrome Web Store, increasing their visibility and potential for success. This poses a significant risk to users who may unknowingly provide sensitive information to these spoofed sites. The emergence of such tools highlights the ongoing challenges in combating online fraud and the need for users to be vigilant when navigating web applications.

Impact: Chrome Web Store, phishing websites
Remediation: Users should be cautious when entering personal information online and verify website legitimacy. Companies should enhance their security measures and educate users on phishing risks.
Read Original

Google is enhancing its Search functionality by integrating AI capabilities that connect with users' Gmail and Google Photos. This upgrade, available to AI Pro and AI Ultra subscribers, aims to provide more personalized search results by understanding users' preferences and plans without the need for repeated input. However, this move raises privacy concerns as it involves accessing personal data from multiple Google services. Users may worry about how their information is used and whether it could be exposed or mismanaged. As Google continues to expand its AI offerings, the implications for user privacy and data security are becoming increasingly significant.

Impact: Google Search, Gmail, Google Photos
Remediation: Users should review their privacy settings and consider the implications of allowing AI to access their personal data across services.
Read Original

Google's 'Take A Message' voicemail feature has been reported to unintentionally leave recorded messages, potentially leaking sensitive background audio. This issue can affect users who rely on this feature for managing their voicemails. The concern arises particularly when users believe their conversations are private, but the feature may be recording and storing audio without their knowledge. Such vulnerabilities can lead to privacy breaches and unwanted exposure of personal information. Users are advised to disable this feature until a fix is provided to prevent any unintended leaks.

Impact: Google Pixel devices using the 'Take A Message' feature
Remediation: Users should turn off the 'Take A Message' feature until a resolution is implemented.
Read Original

Researchers have discovered five malicious Chrome extensions designed to target users of Workday, NetSuite, and SuccessFactors. These extensions are capable of stealing cookies and preventing access to critical security pages on these platforms. This poses a significant risk to organizations that rely on these software solutions for their operations, as attackers can gain unauthorized access to sensitive information. Users of these platforms should be particularly vigilant about the extensions they install and ensure they are using only trusted sources. The presence of such malicious tools illustrates the ongoing challenges of keeping enterprise software environments secure.

Impact: Workday, NetSuite, SuccessFactors
Remediation: Users should uninstall any suspicious Chrome extensions and regularly monitor their browser for unauthorized additions. Additionally, organizations should educate employees about the risks of installing unverified extensions.
Read Original
Page 1 of 4Next