Author: Admin
August 2, 2024Hacker newsVulnerability / Network Security Enterprise resource planning (ERP) software is at the heart of many businesses supporting HR, accounting, shipping and manufacturing. These systems can become very complex and difficult to maintain. They are often highly customized, which can make it difficult to fix. However, critical vulnerabilities continue to affect these systems and put critical business data at risk. SANS Internet Storm Center published a report showing how the open source ERP platform OFBiz is currently the target of new strains of the Mirai botnet. As part of its broad portfolio of projects, the Apache Foundation supports…
August 2, 2024Ravi LakshmananCyber Crime / Hacking News U historical prisoner exchange between Belarus, Germany, Norway, Russia, Slovenia and the USA, two Russian citizens serving sentences for cybercrime were released and repatriated to their country. They are Roman Valerievich Seleznev and Vladislav Klyushin, who are part of a group of eight people who were sent back to Russia in exchange for the release of 16 people who had been detained, including four Americans, five Germans and seven Russian citizens, who were kept as political prisoners. US President Joe Biden is called hailed the deal as a “feat of diplomacy”, adding…
August 2, 2024Ravi LakshmananMalware / Network Security Cybersecurity companies are warning of a surge in misuse of Clouflare’s free TryCloudflare service to deliver malware. Activity documented by both eFeel and Proofinvolves using TryCloudflare to create a one-way tunnel that acts as a conduit to relay traffic from an attacker-controlled server to a local machine through Cloudflare’s infrastructure. Attack chains using this technique have been observed to deliver a cocktail of malware families such as AsyncRAT, GuLoader, PureLogs Stealer, Remcos RAT, Venom RAT, and XWorm. The initial access vector is a phishing email that contains a ZIP archive that includes a…
August 1, 2024Ravi LakshmananVulnerability / Threat Intelligence More than a million domains are susceptible to hijacking by attackers using the so-called a Ducks are sitting attack. A powerful attack vector exploiting weaknesses in the Domain Name System (DNS) is being used by more than a dozen Russian cybercriminals to secretly hijack domains, a joint analysis published Info block and Eclipse discovered. “In a Sitting Ducks attack, an actor hijacks a registered domain from an authoritative DNS service or web hosting provider without accessing the real owner’s account on any DNS provider or recorder,” the researchers said. “Sitting Ducks are easier…
In another sign that threat actors are always looking for new ways to trick users into downloading malware, it emerged that a question-and-answer (Q&A) platform known as Stack Exchange was used to direct unsuspecting developers to fake Python packages capable of drain their cryptocurrency wallets. “Once installed, this code will execute automatically, triggering a chain of events designed to hack and control the victim’s systems, steal their data and drain their crypto wallets,” Checkmarx researchers Yehuda Gelb and Tzahi Zornstein said in the report shared with The Hacker News. The campaign, which began on June 25, 2024, specifically singled out…
August 1, 2024Ravi LakshmananBanking trojan / cyber fraud Cybersecurity researchers have discovered a new Android Remote Access Trojan (RAT) called BingoMod which not only executes fraudulent money transfers from compromised devices, but also deletes them in an attempt to erase traces of the malware. Italian cybersecurity firm Cleafy, which discovered the RAT in late May 2024, said the malware was under active development. He attributed the Android Trojan to a likely Romanian-speaking threat actor due to the presence of Romanian-language comments in the source code associated with early versions. “BingoMod belongs to the current generation of mobile RAT malware, as…
How to detect and prevent attackers from using these different methods Obfuscation is an important technique for protecting software that also carries risks, especially when used by malware authors. In this article, we examine obfuscation, its implications, and responses to it. What is obfuscation? Obfuscation is a method of intentionally making information difficult to read, especially in computer coding. An important use case is data obfuscation, where sensitive data is rendered unrecognizable to protect it from unauthorized access. Various methods are used for this. For example, often only the last four digits of a credit card number are displayed, with…
August 1, 2024Ravi LakshmananData Encryption / Browser Security Google has announced that it is adding a new layer of protection to its Chrome browser through so-called application-bound encryption to prevent information-stealing malware from hijacking cookies on Windows systems. “On Windows Chrome uses the Data Protection API (DPAPI) that protects data at rest from other system users or cold boot attacks.” — Will Harris of the Chrome Security Team said. “However, DPAPI does not protect against malware capable of executing code on behalf of a logged-in user, which is used by information thieves.” Application-bound encryption is an improvement over DPAPI in…
August 1, 2024Ravi LakshmananInternet fraud / Malicious advertising Facebook users are being targeted by an e-commerce fraud network that uses hundreds of fake websites to steal personal and financial data using brand impersonation and malicious advertising tricks. Recorded Future’s Payment Fraud Intelligence team, which discovered the company on April 17, 2024, named it ERIAKOS due to its use of the same content delivery network (CDN) as oss.eriakos(.)com. “These fraudulent sites were only accessible via mobile devices and advertising baits, a tactic designed to evade automated detection systems,” the company said in a statement. saidnoting that the network included 608 fraudulent…
July 31, 2024Ravi LakshmananDevelopment of malware / programs The threat actors behind the current malware campaign targeting software developers have demonstrated new malware and tactics as they expand their focus to Windows, Linux and macOS systems. Activity cluster, dubbing DEV#POPER and linked to North Korea, has been found to have singled out victims in South Korea, North America, Europe and the Middle East. “This form of attack is an advanced form of social engineering designed to manipulate people into revealing sensitive information or taking actions they might not normally take,” Securonix researchers Dan Yuzwick and Tim Peck said in a…