Author: Admin

July 31, 2024Ravi LakshmananCyber ​​espionage / threat intelligence Companies in Russia and Moldova have been targeted by a phishing campaign organized by a little-known cyber espionage group known as XDSpy. The findings come from cybersecurity firm FACCT, which said the infection chains lead to the deployment of malware called DDSownloader. Activity was observed this month as well, it added. XDSpy is a menacing actor of uncertain origin who was the first uncovered By the Belarusian Computer Emergency Response Team, CERT.BY, in February 2020. Next analysis by ESET attributed to group to attacks to steal information since 2011, assigned to government…

Read More

July 31, 2024Ravi LakshmananMobile Security / Malware Since at least February 2022, a new malware campaign has been observed using malicious Android apps to steal users’ SMS messages as part of a large-scale campaign. The malware, which spans more than 107,000 unique samples, is designed to intercept one-time passwords (OTPs) used for online account verification to commit identity fraud. “Of these 107,000 malware samples, more than 99,000 of these apps are/were unknown and not available in public repositories,” according to mobile security company Zimperium. said in a report shared with The Hacker News. “This malware monitored OTP messages for more…

Read More

July 31, 2024Ravi LakshmananPrivacy / Social Media Meta, the parent company of Facebook, Instagram and WhatsApp, has agreed to a record $1.4 billion settlement with the US state of Texas over allegations it illegally collected the biometric data of millions of users without their permission, in one of the largest fines levied by regulators. against the tech giant. “This historic settlement demonstrates our commitment to standing up to the world’s largest technology companies and holding them accountable for violating the law and the privacy rights of Texans,” said Attorney General Ken Paxton said. “Any misuse of Texans’ confidential data will…

Read More

There’s no doubting Paes’ commitment. He’s well aware of the undertaking and is excited about the opportunities in front of him and Indonesian Nation Team–currently ranked 134th in the world. “What I want to achieve is putting Indonesia on the soccer map,” he said. “It’s a huge country, 300 million people and their number one sport is football, or soccer. If you see the amount of support that they get, the potential that is there, it’s just time to fulfill that potential. “And off the field, I also want to be leading by example and have a huge impact there.…

Read More

July 30, 2024Hacker newsDark Web Intelligence Learn about the critical threats that can affect your organization and the criminals behind them from Cybersixgill’s threat experts. Each story sheds light on the underground activity, the threat actors and why you should care, and what you can do to reduce your risk. The deep and dark web, also known as the cybercriminal underground, is where criminals gather to share plans, sell goods or services, and recruit others to help with their illegal activities. Understanding how it functions and what information it offers is critical to proactively protecting your environment from attacks, as…

Read More

July 30, 2024Ravi LakshmananMobile Security / Spyware A new iteration of a sophisticated Android spyware called Mandragora was found in five apps that were available for download from the Google Play Store and remained undetected for two years. The apps attracted a total of more than 32,000 installs before being removed from the app storefront, Kaspersky said on Monday. Most of the downloads come from Canada, Germany, Italy, Mexico, Spain, Peru and the UK “The new samples included new levels of obfuscation and evasion techniques, such as moving malicious functionality into obfuscated proprietary libraries, using certificate pinning for C2 communication,…

Read More

As more people work remotely, IT departments must manage devices spread across cities and countries, relying on VPNs and remote monitoring and management (RMM) tools for system administration. However, like any new technology, RMM tools can also be used maliciously. Threat actors can connect to a victim’s device and run commands, steal data, and remain undetected. This article will look at real-world examples of RMM exploits and show you how to protect your organization against these attacks. What are RMM tools? RMM software simplifies network management by allowing IT professionals to remotely troubleshoot problems, install software, and upload or download…

Read More

July 30, 2024Ravi LakshmananMalware/cyber threats Cybersecurity researchers have detailed widespread phishing campaigns targeting small and medium-sized businesses (SMBs) in Poland during May 2024, which led to the deployment of several malware families, such as Tesla agent, Formand Remcos RAT. According to cybersecurity firm ESET, some other regions targeted include Italy and Romania. “The attackers used previously compromised email accounts and company servers not only to distribute malicious emails, but also to host malware and collect stolen data,” ESET researcher Jakub Kalach said in a report released today. Spread over nine waves, these campaigns are distinguished by the use of a…

Read More

July 30, 2024Ravi LakshmananCyber ​​espionage / malware A nation-state threat entity known as SideWinder has been attributed to a new cyberespionage campaign targeting ports and maritime facilities in the Indian Ocean and Mediterranean Sea. BlackBerry Research and Intelligence Group, which revealed Due to this activity, countries such as Pakistan, Egypt, Sri Lanka, Bangladesh, Myanmar, Nepal and Maldives are targeted by the phishing campaign. SideWinder, which also goes by the names APT-C-17, Baby Elephant, Hardcore Nationalist, Rattlesnake and Razor Tiger, is believed to be linked to India. It has been in operation since 2012, often using phishing as a vector to…

Read More

he Communications and Information Ministry has given six unregistered foreign online travel agents (OTAs) a deadline of March 13 to comply with Indonesian regulations before the government moves to block local access to their platforms.The ministry’s written warning issued on Tuesday to the six firms refers to the government’s licensing framework on its censorship powers and digital taxation policies. “In the event that the six foreign private ESPs [electronic system providers] do not respond to the warning letter, the Communications and Information Ministry can impose administrative sanctions in the form of termination of access to [their platforms],” the ministry stated…

Read More