Articles tagged "Malware"

Found 211 articles

A new information-stealing malware called 'SolyxImmortal' has emerged, which utilizes legitimate APIs and libraries to gather sensitive data. The malware sends this stolen information to Discord webhooks, making detection challenging. This type of attack can affect anyone who unwittingly downloads the malware, potentially compromising personal and financial information. As cybercriminals increasingly exploit trusted platforms and tools, users need to be vigilant about the software they install and the permissions they grant. This incident serves as a reminder of the evolving tactics used by attackers to bypass security measures.

Impact: N/A
Remediation: Users should avoid downloading unverified software and regularly monitor their systems for unusual activity. Employing security software that scans for malware and suspicious behavior can also help mitigate risks.
Read Original

This week, several significant cybersecurity incidents have emerged, showcasing the vulnerabilities within various systems. Notably, flaws in Fortinet products have come to light, potentially exposing users to exploitation. Additionally, researchers have identified the RedLine Clipjack malware, which can hijack browser sessions, affecting users who may not realize their data is being compromised. The discovery of a method to crack NTLM authentication raises concerns for organizations relying on this protocol, as it could lead to unauthorized access. Furthermore, a new attack targeting AI tools like Copilot illustrates how these advancements can be manipulated, posing risks to users and their data. These incidents emphasize the need for robust security measures as technology continues to evolve rapidly.

Impact: Fortinet products, NTLM authentication, AI tools like Copilot
Remediation: Users should apply the latest security updates from Fortinet, review authentication protocols, and implement additional security measures for AI tools.
Read Original
Hackers Exploiting PDF24 App to Deploy Stealthy PDFSIDER Backdoor

Hackread – Cybersecurity News, Data Breaches, AI, and More

Actively Exploited

Researchers from Resecurity have uncovered a new malware called PDFSIDER that takes advantage of the legitimate PDF24 application to steal sensitive data and provide attackers with remote access to compromised systems. This malware is part of a sophisticated campaign targeting corporate networks, utilizing spear-phishing tactics to lure victims and encrypted communications to evade detection. Companies using PDF24 should be particularly vigilant as this attack leverages a trusted application, making it easier for attackers to bypass security measures. The implications are serious, as this could lead to significant data breaches and unauthorized access to sensitive corporate information.

Impact: PDF24 App, corporate networks
Remediation: Users should monitor for unusual activity in their networks, implement strong email filtering to block spear-phishing attempts, and ensure that all software, including PDF24, is kept up to date with the latest security patches.
Read Original

CyberArk has reported that it successfully exploited a vulnerability in the StealC infostealer malware to gather intelligence. This malware is known for stealing sensitive information from infected systems, which can include login credentials, financial data, and personal information. By exploiting the flaw, researchers were able to collect evidence that can help understand how the malware operates and how it might be mitigated. This incident underscores the ongoing challenges posed by infostealers and the need for organizations to remain vigilant against such threats. Users and companies should ensure their systems are updated and monitor for signs of compromise, as infostealers like StealC can have serious implications for data security.

Impact: StealC infostealer malware
Remediation: Users should update their systems and implement security measures to monitor for infections.
Read Original

Researchers have identified a cross-site scripting (XSS) vulnerability in the control panel of StealC, a malware used for stealing information. This flaw allowed the researchers to monitor the activities of the threat actor behind the malware, including capturing system fingerprints and tracking active sessions. The discovery is significant as it provides a rare glimpse into the operations of cybercriminals who utilize this malware. Understanding how these operators function can aid in developing better defenses against such threats. As StealC continues to be a tool for attackers, this vulnerability highlights the ongoing risks associated with information-stealing malware.

Impact: StealC information stealer malware control panel
Remediation: N/A
Read Original

Researchers have discovered 17 malicious browser extensions associated with the GhostPoster campaign that have been installed over 840,000 times across Chrome, Firefox, and Edge stores. These extensions are designed to hijack users' browsing sessions and can potentially lead to data theft or other malicious activities. The widespread installation indicates that many users may have unknowingly compromised their security by downloading these harmful extensions. It's crucial for users to regularly check their installed extensions and remove any that seem suspicious. The incident raises concerns about the security measures in place within browser extension stores and the need for more stringent vetting processes to protect users from such threats.

Impact: Chrome, Firefox, Edge browsers
Remediation: Users should uninstall any suspicious browser extensions and regularly review their installed extensions for potential threats.
Read Original
Actively Exploited

Researchers have discovered a vast network of over 18,000 command-and-control servers operated by Chinese cybercriminals, which have been used to facilitate malware attacks. These servers are spread across 48 different hosting providers and account for nearly 84% of all malicious cyber activities within Chinese hosting environments over the past three months. This extensive operation poses significant risks to businesses and individuals, as the malware can compromise systems and steal sensitive information. The scale of the operation indicates a well-organized effort that could have far-reaching implications for cybersecurity in the region and beyond. Companies need to remain vigilant and enhance their defenses against these types of threats.

Impact: N/A
Remediation: Companies should enhance their cybersecurity measures, regularly update their systems, and monitor for any suspicious activity.
Read Original

Researchers discovered a cross-site scripting (XSS) vulnerability in the web-based control panel of the StealC info-stealing malware. This flaw allowed them to monitor the malware operators' active sessions and collect data on their hardware setups. StealC is designed to steal sensitive information from users, which means this incident not only exposes the attackers but also raises concerns about the ongoing effectiveness of such malware. Understanding these vulnerabilities can help cybersecurity experts develop better defenses against similar threats. The incident serves as a reminder that even sophisticated malware can have weaknesses that researchers can exploit to gain insights into cybercriminal operations.

Impact: StealC info-stealing malware control panel
Remediation: Implement proper input validation and sanitization to mitigate XSS vulnerabilities; regularly update security protocols for web applications.
Read Original

A new malvertising campaign known as TamperedChef is distributing malware through fake PDF manuals that appear to be legitimate. This malware creates backdoors on infected systems, allowing attackers to steal user credentials, particularly targeting organizations that rely heavily on technical equipment. Researchers have identified that these malicious ads can lead users to download harmful files, putting sensitive information at risk. The implications of this attack are significant, as it could compromise various organizations' security and operational integrity. Users need to be cautious about downloading files from unverified sources, especially when they seem to be offering manuals or guides.

Impact: Organizations reliant on technical equipment, users downloading fake PDF manuals
Remediation: Users should avoid downloading files from unverified sources and ensure that their security software is updated. Organizations should educate employees about the risks of malvertising and implement stricter controls on document downloads.
Read Original
Operation Endgame: Dutch Police Arrest Alleged AVCheck Operator

Hackread – Cybersecurity News, Data Breaches, AI, and More

Dutch police have arrested an individual believed to be the operator of AVCheck, a malware service, at Schiphol Airport. This arrest is part of a larger initiative known as Operation Endgame, which aims to crack down on various cybercrime activities and malware services globally. AVCheck is known for providing tools and services that facilitate cyberattacks, making this operation a significant step in combating online crime. The arrest not only disrupts the operations of AVCheck but also sends a strong message to other cybercriminals about the law enforcement efforts to tackle cyber threats. This incident highlights ongoing international cooperation in addressing cybercrime, a growing concern for individuals and organizations alike.

Impact: AVCheck malware service
Remediation: N/A
Read Original

Security experts have uncovered a targeted campaign aimed at U.S. government and policy organizations, utilizing politically charged themes related to the U.S.-Venezuela relationship. Attackers are distributing a backdoor malware known as LOTUSLITE through spear phishing emails that include a ZIP file titled 'US now deciding what's next for Venezuela.zip.' This tactic exploits current geopolitical tensions to lure victims into opening the malicious attachment. The campaign highlights the ongoing risk of politically motivated cyber attacks that can compromise sensitive information and undermine national security. As such, it's crucial for organizations in the affected sectors to enhance their security measures and educate employees about recognizing phishing attempts.

Impact: U.S. government and policy entities, specifically those involved in U.S.-Venezuela relations.
Remediation: Organizations should implement advanced email filtering, conduct security awareness training, and ensure all systems are updated with the latest security patches.
Read Original

The January Patch Tuesday updates for Windows include important changes to Secure Boot, which safeguards computers against bootkit malware. Secure Boot is a security feature that ensures only trusted software is loaded during the startup process. The updates address expiring certificates that could compromise this protection if not renewed. Users and IT administrators are urged to install these patches promptly to mitigate the risk of bootkit attacks, which can allow malicious software to take control of a system before the operating system loads. Keeping Secure Boot updated is crucial for maintaining the integrity and security of Windows PCs.

Impact: Windows PCs with Secure Boot enabled
Remediation: Install the January Patch Tuesday updates for Windows to refresh Secure Boot certificates.
Read Original

Researchers have identified a malware campaign utilizing AsyncRAT, a remote access tool, which is being cleverly masked by cybercriminals through Cloudflare's services. By using Cloudflare’s free-tier offerings and TryCloudflare tunneling domains, attackers are able to host malicious WebDAV servers. This tactic allows them to hide their operations behind a trusted infrastructure, making detection more difficult. The campaign raises significant concerns for organizations relying on Cloudflare, as it shows how legitimate services can be exploited for malicious purposes. Companies must remain vigilant and enhance their security measures to counteract such deceptive tactics that can lead to unauthorized access and data breaches.

Impact: Cloudflare services, AsyncRAT malware
Remediation: Organizations should monitor their Cloudflare configurations and traffic for unusual activity, implement strict access controls, and consider additional security measures such as intrusion detection systems.
Read Original

The Computer Emergency Response Team of Ukraine (CERT-UA) has reported a series of cyberattacks targeting Ukraine's defense forces, utilizing a malware known as PLUGGYAPE. These attacks are believed to be linked to the Russian cyber group Void Blizzard, also referred to as Laundry Bear or UAC-0190. The attacks come amidst ongoing tensions and conflict in the region, raising concerns about the security of military operations in Ukraine. Given the group’s history and capabilities, these incidents could pose significant risks to the integrity of defense communications and operations. The situation underscores the continuing cyber warfare component of the conflict, as nation-states increasingly rely on digital tactics alongside traditional military strategies.

Impact: Ukraine's defense forces
Remediation: N/A
Read Original

A new malware campaign known as PluggyApe has been targeting defense officials in Ukraine. The attackers have been using a charity theme to lure victims into clicking on links that lead to a fake charitable foundation website. This tactic involves sending instant messages through platforms like Signal and WhatsApp, making it appear as though the outreach is legitimate. The campaign's focus on defense personnel raises concerns about the potential for sensitive information to be compromised, especially given the ongoing conflict in the region. As cyber threats continue to evolve, this incident serves as a reminder of the need for vigilance among individuals and organizations against social engineering tactics.

Impact: Ukrainian defense officials
Remediation: Users should be cautious of unsolicited messages, verify the authenticity of links before clicking, and maintain updated security software.
Read Original
PreviousPage 7 of 15Next