Author: Admin
January 13, 2025Ravi LakshmananMalware / Domain Security At least 4,000 unique web backdoors previously deployed by various threat actors were captured by taking control of abandoned and outdated infrastructure for as little as $20 per domain. Cybersecurity company watchTowr Labs said it completed the operation, registering more than 40 domain names that the backdoors were designed to use for command and control purposes (C2). In partnership with the Shadowserver Foundation, the domains involved in the study were processed. “We hijacked backdoors (that depended on now-abandoned infrastructure and/or expired domains) that existed inside backdoors themselves, and have watched the results flow…
Cyber security researchers are warning about the emergence of a new stealth credit card skimmer company which targets WordPress e-commerce pages by inserting malicious JavaScript code into a database table linked to the content management system (CMS). “This credit card skimmer malware targeting WordPress websites silently injects malicious JavaScript into database records to steal sensitive payment details,” Sucuri researcher Pooja Srivastava said in a new analysis. “The malware is activated specifically on checkout pages, either by hijacking existing payment fields or by entering a fake credit card form.” Website security company owned by GoDaddy says it has discovered malware embedded…
January 11, 2025Ravi LakshmananAI Security / Cyber Security Microsoft has shown that it is pursuing legal action against a “foreign threat group” for operating a hacking-as-a-service infrastructure to deliberately bypass security controls on its generative artificial intelligence (AI) services and create offensive and harmful content. The tech giant’s digital crime unit (DCU) said it observed threat actors “developing sophisticated software that uses exposed customer credentials taken from public websites” and “trying to identify and illegally access accounts with certain generative artificial intelligence services and intentionally alter the capabilities of those services.” Adversaries then used these services, such as Azure OpenAI…
Justice Department indicts three Russians for operating crypto-mixers used to launder cybercrimes
January 11, 2025Ravi LakshmananFinancial Crime / Cryptocurrency The US Department of Justice (DoJ) on Friday indicted three Russian nationals for their alleged involvement in running cryptocurrency mixing services Blender.io and Sinbad.io. Roman Vitalyevich Ostapenko and Alexander Evgenievich Aleynik were arrested on December 1, 2024 in coordination with the Financial Intelligence and Investigation Service of the Netherlands, the National Bureau of Investigation of Finland and the Federal Bureau of Investigation (FBI) of the United States. It is not known where they were detained. The third person, Anton Vyachalavovich Tarasov, is still at large. The defendants are accused of operating cryptocurrency mixers…
January 10, 2025Ravi LakshmananCrypto mining / malware Cybersecurity firm CrowdStrike is warning of a phishing campaign using its own brand to distribute a cryptocurrency miner disguised as an employee CRM application as part of an alleged recruitment process. “The attack begins with a phishing email that mimics CrowdStrike recruitment, directing recipients to a malicious website,” the company said in a statement. said. “Victims are encouraged to download and run a fake application that serves as a bootloader for the XMRig cryptominer.” The Texas-based company said it discovered the malicious campaign on January 7, 2025, and that it was “aware of…
January 10, 2025Ravi LakshmananCyber espionage / Cyber attack Mongolia, Taiwan, Myanmar, Vietnam and Cambodia have been targeted by China-linked RedDelta threat to deliver a customized version of the PlugX backdoor between July 2023. until December 2024. “The group used eye-catching documents on Taiwan’s 2024 presidential candidate Terry Gou, Vietnam’s national holidays, flood protection in Mongolia and invitations to meetings, including the Association of Southeast Asian Nations (ASEAN) meeting,” Insikt Group Recorded Future said in a new analysis. The threat actor is believed to have compromised the Ministry of Defense of Mongolia in August 2024. and the Communist Party of Vietnam…
January 10, 2025Ravi LakshmananArtificial Intelligence / Cybercrime Cyber security researchers shed light on nascent family of artificial intelligence (AI) ransomware FunkSec which originated in late 2024 and has claimed more than 85 lives to date. “The group uses a two-pronged extortion tactic, combining data theft with encryption to force victims to pay the ransom,” Check Point Research notes. said in a new report shared with The Hacker News. “Notably, FunkSec demanded unusually low ransoms, sometimes as low as $10,000, and sold the stolen data to third parties at discounted prices.” FunkSec launched its Data Leakage Site (DLS) in December 2024…
Cybersecurity reporting is an important but often overlooked capability for service providers who manage cybersecurity for their customers, and in particular for virtual chief information security officers (vCISOs). While reporting is seen as a requirement for tracking cybersecurity progress, it’s often bogged down with technical jargon, complex data, and disjointed spreadsheets that don’t resonate with decision makers. The result? Clients who struggle to understand the value of your work and remain insecure about their safety. But what if reporting could be turned into a strategic tool for aligning cybersecurity with business goals? What if your reports empowered customers, built trust,…
January 10, 2025Ravi LakshmananCyber Security / Android Cybersecurity researchers have detailed the patched security flaw that affects Audio monkey (APE) decoder on Samsung smartphones, which can lead to code execution. A high severity vulnerability tracked as CVE-2024-49415 (CVSS score: 8.1), affects Samsung devices running Android versions 12, 13, and 14. “Out-of-bounds writing in libsaped.so before SMR Dec-2024 Release 1 allows remote attackers to execute arbitrary code,” Samsung said in a shortfall advisory published in December 2024. as part of monthly security updates. “Patch adds proper input validation.” Google Project Zero researcher Natalie Silvanovitch, who discovered and reported the flaw, described…
Network segmentation remains a critical security requirement, but organizations struggle with traditional approaches that require large hardware investments, complex policy management, and disruptive network changes. The healthcare and manufacturing sectors face particular challenges as they integrate a variety of endpoints into their production networks, from legacy medical devices to IoT sensors. These devices often lack robust security hardening, creating significant vulnerabilities that traditional segmentation solutions struggle to address. Elisity aims to address these challenges with an innovative approach that leverages existing network infrastructure while providing identity-based micro-segmentation at the network edge. Rather than requiring new hardware, agents, or complex network…