The Hacker News

Syndikovat obsah
The Hacker News has been internationally recognized as a leading news source dedicated to promoting awareness for security experts and [email protected]
Aktualizace: 2 min 35 sek zpět

New Rust-based Fickle Malware Uses PowerShell for UAC Bypass and Data Exfiltration

20 Červen, 2024 - 10:09
A new Rust-based information stealer malware called Fickle Stealer has been observed being delivered via multiple attack chains with the goal of harvesting sensitive information from compromised hosts. Fortinet FortiGuard Labs said it's aware of four different distribution methods -- namely VBA dropper, VBA downloader, link downloader, and executable downloader -- with some of them using a
Kategorie: Hacking & Security

New Rust-based Fickle Malware Uses PowerShell for UAC Bypass and Data Exfiltration

20 Červen, 2024 - 10:09
A new Rust-based information stealer malware called Fickle Stealer has been observed being delivered via multiple attack chains with the goal of harvesting sensitive information from compromised hosts. Fortinet FortiGuard Labs said it's aware of four different distribution methods -- namely VBA dropper, VBA downloader, link downloader, and executable downloader -- with some of them using a Newsroomhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

Experts Uncover New Evasive SquidLoader Malware Targeting Chinese Organizations

20 Červen, 2024 - 08:34
Cybersecurity researchers have uncovered a new evasive malware loader named SquidLoader that spreads via phishing campaigns targeting Chinese organizations. AT&T LevelBlue Labs, which first observed the malware in late April 2024, said it incorporates features that are designed to thwart static and dynamic analysis and ultimately evade detection. Attack chains leverage phishing emails that
Kategorie: Hacking & Security

Experts Uncover New Evasive SquidLoader Malware Targeting Chinese Organizations

20 Červen, 2024 - 08:34
Cybersecurity researchers have uncovered a new evasive malware loader named SquidLoader that spreads via phishing campaigns targeting Chinese organizations. AT&T LevelBlue Labs, which first observed the malware in late April 2024, said it incorporates features that are designed to thwart static and dynamic analysis and ultimately evade detection. Attack chains leverage phishing emails that Newsroomhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

Kraken Crypto Exchange Hit by $3 Million Theft Exploiting Zero-Day Flaw

19 Červen, 2024 - 18:40
Crypto exchange Kraken revealed that an unnamed security researcher exploited an "extremely critical" zero-day flaw in its platform to steal $3 million in digital assets and refused to return them. Details of the incident were shared by Kraken's Chief Security Officer, Nick Percoco, on X (formerly Twitter), stating it received a Bug Bounty program alert from the researcher about a bug that "
Kategorie: Hacking & Security

Kraken Crypto Exchange Hit by $3 Million Theft Exploiting Zero-Day Flaw

19 Červen, 2024 - 18:40
Crypto exchange Kraken revealed that an unnamed security researcher exploited an "extremely critical" zero-day flaw in its platform to steal $3 million in digital assets and refused to return them. Details of the incident were shared by Kraken's Chief Security Officer, Nick Percoco, on X (formerly Twitter), stating it received a Bug Bounty program alert from the researcher about a bug that "Newsroomhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

UNC3886 Uses Fortinet, VMware 0-Days and Stealth Tactics in Long-Term Spying

19 Červen, 2024 - 17:09
The China-nexus cyber espionage actor linked to the zero-day exploitation of security flaws in Fortinet, Ivanti, and VMware devices has been observed utilizing multiple persistence mechanisms in order to maintain unfettered access to compromised environments. "Persistence mechanisms encompassed network devices, hypervisors, and virtual machines, ensuring alternative channels remain available
Kategorie: Hacking & Security

UNC3886 Uses Fortinet, VMware 0-Days and Stealth Tactics in Long-Term Spying

19 Červen, 2024 - 17:09
The China-nexus cyber espionage actor linked to the zero-day exploitation of security flaws in Fortinet, Ivanti, and VMware devices has been observed utilizing multiple persistence mechanisms in order to maintain unfettered access to compromised environments. "Persistence mechanisms encompassed network devices, hypervisors, and virtual machines, ensuring alternative channels remain available Newsroomhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

New Case Study: Unmanaged GTM Tags Become a Security Nightmare

19 Červen, 2024 - 13:03
Are your tags really safe with Google Tag Manager? If you've been thinking that using GTM means that your tracking tags and pixels are safely managed, then it might be time to think again. In this article we look at how a big-ticket seller that does business on every continent came unstuck when it forgot that you can’t afford to allow tags to go unmanaged or become misconfigured.  Read the
Kategorie: Hacking & Security

New Case Study: Unmanaged GTM Tags Become a Security Nightmare

19 Červen, 2024 - 13:03
Are your tags really safe with Google Tag Manager? If you've been thinking that using GTM means that your tracking tags and pixels are safely managed, then it might be time to think again. In this article we look at how a big-ticket seller that does business on every continent came unstuck when it forgot that you can’t afford to allow tags to go unmanaged or become misconfigured.  Read the The Hacker Newshttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

New Threat Actor 'Void Arachne' Targets Chinese Users with Malicious VPN Installers

19 Červen, 2024 - 12:23
Chinese-speaking users are the target of a never-before-seen threat activity cluster codenamed Void Arachne that employs malicious Windows Installer (MSI) files for virtual private networks (VPNs) to deliver a command-and-control (C&C) framework called Winos 4.0. "The campaign also promotes compromised MSI files embedded with nudifiers and deepfake pornography-generating software, as well as
Kategorie: Hacking & Security

New Threat Actor 'Void Arachne' Targets Chinese Users with Malicious VPN Installers

19 Červen, 2024 - 12:23
Chinese-speaking users are the target of a never-before-seen threat activity cluster codenamed Void Arachne that employs malicious Windows Installer (MSI) files for virtual private networks (VPNs) to deliver a command-and-control (C&C) framework called Winos 4.0. "The campaign also promotes compromised MSI files embedded with nudifiers and deepfake pornography-generating software, as well asNewsroomhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

Warning: Markopolo's Scam Targeting Crypto Users via Fake Meeting Software

19 Červen, 2024 - 12:08
A threat actor who goes by alias markopolo has been identified as behind a large-scale cross-platform scam that targets digital currency users on social media with information stealer malware and carries out cryptocurrency theft. The attack chains involve the use of a purported virtual meeting software named Vortax (and 23 other apps) that are used as a conduit to deliver Rhadamanthys, StealC,
Kategorie: Hacking & Security

Warning: Markopolo's Scam Targeting Crypto Users via Fake Meeting Software

19 Červen, 2024 - 12:08
A threat actor who goes by alias markopolo has been identified as behind a large-scale cross-platform scam that targets digital currency users on social media with information stealer malware and carries out cryptocurrency theft. The attack chains involve the use of a purported virtual meeting software named Vortax (and 23 other apps) that are used as a conduit to deliver Rhadamanthys, StealC, Newsroomhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

Mailcow Mail Server Flaws Expose Servers to Remote Code Execution

19 Červen, 2024 - 09:36
Two security vulnerabilities have been disclosed in the Mailcow open-source mail server suite that could be exploited by malicious actors to achieve arbitrary code execution on susceptible instances. Both shortcomings impact all versions of the software prior to version 2024-04, which was released on April 4, 2024. The issues were responsibly disclosed by SonarSource on March 22, 2024. The flaws
Kategorie: Hacking & Security

Mailcow Mail Server Flaws Expose Servers to Remote Code Execution

19 Červen, 2024 - 09:36
Two security vulnerabilities have been disclosed in the Mailcow open-source mail server suite that could be exploited by malicious actors to achieve arbitrary code execution on susceptible instances. Both shortcomings impact all versions of the software prior to version 2024-04, which was released on April 4, 2024. The issues were responsibly disclosed by SonarSource on March 22, 2024. The flawsNewsroomhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

Signal Foundation Warns Against EU's Plan to Scan Private Messages for CSAM

18 Červen, 2024 - 18:22
A controversial proposal put forth by the European Union to scan users' private messages for detection of child sexual abuse material (CSAM) poses severe risks to end-to-end encryption (E2EE), warned Meredith Whittaker, president of the Signal Foundation, which maintains the privacy-focused messaging service of the same name. "Mandating mass scanning of private communications fundamentally
Kategorie: Hacking & Security

Signal Foundation Warns Against EU's Plan to Scan Private Messages for CSAM

18 Červen, 2024 - 18:22
A controversial proposal put forth by the European Union to scan users' private messages for detection of child sexual abuse material (CSAM) poses severe risks to end-to-end encryption (E2EE), warned Meredith Whittaker, president of the Signal Foundation, which maintains the privacy-focused messaging service of the same name. "Mandating mass scanning of private communications fundamentally Newsroomhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

Cybercriminals Exploit Free Software Lures to Deploy Hijack Loader and Vidar Stealer

18 Červen, 2024 - 15:30
Threat actors are luring unsuspecting users with free or pirated versions of commercial software to deliver a malware loader called Hijack Loader, which then deploys an information stealer known as Vidar Stealer. "Adversaries had managed to trick users into downloading password-protected archive files containing trojanized copies of a Cisco Webex Meetings App (ptService.exe)," Trellix security
Kategorie: Hacking & Security

Cybercriminals Exploit Free Software Lures to Deploy Hijack Loader and Vidar Stealer

18 Červen, 2024 - 15:30
Threat actors are luring unsuspecting users with free or pirated versions of commercial software to deliver a malware loader called Hijack Loader, which then deploys an information stealer known as Vidar Stealer. "Adversaries had managed to trick users into downloading password-protected archive files containing trojanized copies of a Cisco Webex Meetings App (ptService.exe)," Trellix security Newsroomhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security