Author: Admin
December 18, 2024Ravi LakshmananCyber Fraud / Social Engineering INTERPOL is calling for a linguistic shift that aims to end the term “butchering of pigs,” instead advocating the use of “romance baiting” to refer to online scams in which victims are tricked into investing in fake cryptocurrency schemes under the guise of a romantic relationship. “The term ‘pig killer’ dehumanizes and shames the victims of such scams, discouraging people from seeking help and providing information to the authorities,” the agency notes. said in the statement. The word originates from the Chinese phrase “杀猪盘” (“shā zhū pán”), which literally translates to “slaughtering…
December 18, 2024Ravi LakshmananCyber Attack / Vulnerability Threat actors are attempting to exploit a recently disclosed security flaw affecting Apache Struts that could open the way for remote code execution. Issue tracked as CVE-2024-53677has a CVSS score of 9.5 out of 10.0, indicating critical severity. This vulnerability is similar to another critical bug that the developers of the project fixed in December 2023. (CVE-2023-50164CVSS score: 9.8) that too came under active exploitation shortly after public disclosure. “An attacker could manipulate file download parameters to allow path traversal, and under some circumstances this could lead to the download of a malicious…
December 18, 2024Ravi LakshmananData Breach / Privacy Meta Platforms, the parent company of Facebook, Instagram, WhatsApp and Threads, was fined 251 million euros (about $263 million) for a data breach in 2018 that affected millions of users in the block. the latest financial hit the company has been found guilty of violating strict privacy laws. The Irish Data Protection Commission (DPC) said the data breach affected around 29 million Facebook accounts worldwide, of which around 3 million are located in the European Union and the European Economic Area (EEA). It should be noted that initial estimates by the tech giant…
December 17, 2024Ravi LakshmananMalware / credential theft A new social engineering company has used Microsoft Teams as a way to facilitate the deployment of a known malware called DarkGate. “An attacker used social engineering via a Microsoft Teams challenge to impersonate a user’s client and gain remote access to their system,” Trend Micro researchers Catherine Laveria, Jovit Samaniego and Gabriel Nicoletta said. “The attacker failed to install the Microsoft Remote Support application, but successfully instructed the victim to download AnyDesk, a tool commonly used for remote access.” How recently documented By cybersecurity firm Rapid7, the attack involved bombarding a target’s…
December 17, 2024Ravi LakshmananCyber attack / malware A new phishing campaign has been spotted using tax-themed lures to deliver hidden backdoor payloads in attacks against Pakistan. Cybersecurity company Securonix, which tracks activity under the name FLUX#CONSOLEsaid it most likely starts with a phishing link to an email or attachment, although it said it could not obtain the original email used to launch the attack. “One of the most notable aspects of the campaign is how threat actors use Microsoft Common Console Document (MSC) files to deploy a bootloader and dual-purpose bootloader to deliver further malicious payloads,” security researchers Dan Yuzwick…
Addressing cyber threats before they have a chance to strike or cause serious damage is by far the best security approach any company can take. Achieving this requires a lot of research and active threat hunting. The problem here is that it’s easy to get stuck in endless arrays of data and not get relevant information. To avoid this, use these five battle-tested techniques that are sure to improve your company’s threat awareness and overall security. Search for threats targeting organizations in your region The most basic, but very effective, way to learn about the current threat to your company…
December 17, 2024Hacker newsWebinar / Risk management Even the best companies can still be hacked with the most advanced tools. This is an unpleasant reality: you’ve invested in the right solutions, trained your team, and strengthened your defenses. But violations still happen. So what’s going wrong? The truth is that attackers are constantly finding new ways to slip through loopholes that often go unnoticed – even in well-prepared organizations. Good news? These cracks can be found and repaired if you know where to look. Join John Paul Cunningham, CISO at Silverfort for a must-attend event webinar that reveals why breaches…
December 17, 2024Ravi LakshmananCyber espionage / malware An alleged South Asian cyber espionage group known as Bitter in November 2024, a Turkish defense sector organization was targeted to deliver two C++ malware families tracked as WmRAT and MiyaRAT. “The attack chain used alternate data streams in the RAR archive to deliver a shortcut (LNK) file that created a scheduled task on the target machine to release further payloads,” Proofpoint researchers Nick Atfield, Constantin Klinger, Pim Truerbach, and David Galazin said in a report shared with The Hacker News. The security company is tracking the threat under the name TA397. The…
Fake software updates are used by threat actors to deliver new stealing malware called CoinLurker. “Written in Go, CoinLurker uses advanced obfuscation and anti-analysis techniques, making it a very effective tool in today’s cyberattacks,” – Morphisec researcher Nadau Lorber said in a technical report published on Monday. Attacks use fake update alerts that use a variety of deceptive entry points, such as software update notifications on compromised WordPress sites, malicious redirects, phishing emails with links to fake update pages, fake CAPTCHA verification requestsdirect downloads from fake or infected sites, and links shared through social networks and messaging apps. Regardless of…
December 17, 2024Ravi LakshmananNetwork Security / IoT Security The US Cybersecurity and Infrastructure Security Agency (CISA) on Monday added two security flaws of its known vulnerabilities (KEV) catalog with reference to evidence of active exploitation in the wild. The list of disadvantages is given below – CVE-2024-20767 (CVSS Score: 7.4) – Adobe ColdFusion contains an improper access control vulnerability that could allow an attacker to access or modify restricted files via an admin panel exposed to the Internet (patched by Adobe in March 2024) CVE-2024-35250 (CVSS Score: 7.8) – The Microsoft Windows kernel mode driver contains an untrusted pointer dereferencing…