The Hacker News

Syndikovat obsah The Hacker News
The Hacker News has been internationally recognized as a leading news source dedicated to promoting awareness for security experts and hackers
Aktualizace: 52 min 32 sek zpět

Chinese Hackers Distribute Backdoored Web3 Wallets for iOS and Android Users

13 Červen, 2022 - 15:53
A technically sophisticated threat actor known as SeaFlower has been targeting Android and iOS users as part of an extensive campaign that mimics official cryptocurrency wallet websites intending to distribute backdoored apps that drain victims' funds. Said to be first discovered in March 2022, the cluster of activity "hint[s] to a strong relationship with a Chinese-speaking entity yet to be
Kategorie: Hacking & Security

HelloXD Ransomware Installing Backdoor on Targeted Windows and Linux Systems

13 Červen, 2022 - 14:37
Windows and Linux systems are being targeted by a ransomware variant called HelloXD, with the infections also involving the deployment of a backdoor to facilitate persistent remote access to infected hosts. "Unlike other ransomware groups, this ransomware family doesn't have an active leak site; instead it prefers to direct the impacted victim to negotiations through Tox chat and onion-based
Kategorie: Hacking & Security

Quick and Simple: BPFDoor Explained

13 Červen, 2022 - 12:49
BPFDoor isn't new to the cyberattack game — in fact, it's gone undetected for years — but PwC researchers discovered the piece of malware in 2021. Subsequently, the cybersecurity community is learning more about the stealthy nature of malware, how it works, and how it can be prevented. What's BPFDoor? BPFDoor is a piece of malware associated with China-based threat actor Red Menshen that has hit
Kategorie: Hacking & Security

Evil Corp Cybercrime Group Shifts to LockBit Ransomware to Evade Sanctions

13 Červen, 2022 - 05:19
The threat cluster dubbed UNC2165, which shares numerous overlaps with a Russia-based cybercrime group known as Evil Corp, has been linked to multiple LockBit ransomware intrusions in what's seen as an attempt by the latter to get around sanctions imposed by the U.S. Treasury in December 2019. "These actors have shifted away from using exclusive ransomware variants to LockBit — a well-known
Kategorie: Hacking & Security

New Privacy Framework for IoT Devices Gives Users Control Over Data Sharing

11 Červen, 2022 - 10:12
A newly designed privacy-sensitive architecture aims to enable developers to create smart home apps in a manner that addresses data sharing concerns and puts users in control over their personal information.  Dubbed Peekaboo by researchers from Carnegie Mellon University, the system "leverages an in-home hub to pre-process and minimize outgoing data in a structured and enforceable manner before
Kategorie: Hacking & Security

Researchers Find Bluetooth Signals Can be Fingerprinted to Track Smartphones

10 Červen, 2022 - 16:53
A new research undertaken by a group of academics from the University of California San Diego has revealed for the first time that Bluetooth signals can be fingerprinted to track smartphones (and therefore, individuals). The identification, at its core, hinges on imperfections in the Bluetooth chipset hardware introduced during the manufacturing process, resulting in a "unique physical-layer
Kategorie: Hacking & Security

Symbiote: A Stealthy Linux Malware Targeting Latin American Financial Sector

10 Červen, 2022 - 16:39
Cybersecurity researchers have taken the wraps off what they call a "nearly-impossible-to-detect" Linux malware that could be weaponized to backdoor infected systems. Dubbed Symbiote by threat intelligence firms BlackBerry and Intezer, the stealthy malware is so named for its ability to conceal itself within running processes and network traffic and drain a victim's resources like a parasite.
Kategorie: Hacking & Security

New Emotet Variant Stealing Users' Credit Card Information from Google Chrome

10 Červen, 2022 - 16:39
Image Source: Toptal The notorious Emotet malware has turned to deploy a new module designed to siphon credit card information stored in the Chrome web browser. The credit card stealer, which exclusively singles out Chrome, has the ability to exfiltrate the collected information to different remote command-and-control (C2) servers, according to enterprise security company Proofpoint, which
Kategorie: Hacking & Security

Researchers Detail How Cyber Criminals Targeting Cryptocurrency Users

10 Červen, 2022 - 11:10
Cybercriminals are impersonating popular crypto platforms such as Binance, Celo, and Trust Wallet with spoofed emails and fake login pages in an attempt to steal login details and deceptively transfer virtual funds. "As cryptocurrency and non-fungible tokens (NFTs) become more mainstream, and capture headlines for their volatility, there is a greater likelihood of more individuals falling victim
Kategorie: Hacking & Security

A Decade-Long Chinese Espionage Campaign Targets Southeast Asia and Australia

9 Červen, 2022 - 18:31
A previously undocumented Chinese-speaking advanced persistent threat (APT) actor dubbed Aoqin Dragon has been linked to a string of espionage-oriented attacks aimed at government, education, and telecom entities chiefly in Southeast Asia and Australia dating as far back as 2013. "Aoqin Dragon seeks initial access primarily through document exploits and the use of fake removable devices,"
Kategorie: Hacking & Security

Even the Most Advanced Threats Rely on Unpatched Systems

9 Červen, 2022 - 17:55
Common cybercriminals are a menace, there's no doubt about it – from bedroom hackers through to ransomware groups, cybercriminals are causing a lot of damage. But both the tools used and the threat posed by common cybercriminals pale in comparison to the tools used by more professional groups such as the famous hacking groups and state-sponsored groups. In fact, these tools can prove almost
Kategorie: Hacking & Security

Apple's New Feature Will Install Security Updates Automatically Without Full OS Update

9 Červen, 2022 - 07:27
Apple has introduced a Rapid Security Response feature in iOS 16 and macOS Ventura that's designed to deploy security fixes without the need for a full operating system version update. "macOS security gets even stronger with new tools that make the Mac more resistant to attack, including Rapid Security Response that works in between normal updates to easily keep security up to date without a
Kategorie: Hacking & Security

Researchers Warn of Unpatched "DogWalk" Microsoft Windows Vulnerability

9 Červen, 2022 - 07:26
An unofficial security patch has been made available for a new Windows zero-day vulnerability in the Microsoft Support Diagnostic Tool (MSDT), even as the Follina flaw continues to be exploited in the wild. The issue — referenced as DogWalk — relates to a path traversal flaw that can be exploited to stash a malicious executable file to the Windows Startup folder when a potential target opens a
Kategorie: Hacking & Security

U.S. Agencies Warn About Chinese Hackers Targeting Telecoms and Network Service Providers

8 Červen, 2022 - 10:20
U.S. cybersecurity and intelligence agencies have warned about China-based state-sponsored cyber actors leveraging network vulnerabilities to exploit public and private sector organizations since at least 2020. The widespread intrusion campaigns aim to exploit publicly identified security flaws in network devices such as Small Office/Home Office (SOHO) routers and Network Attached Storage (NAS)
Kategorie: Hacking & Security

FBI Seizes 'SSNDOB' ID Theft Service for Selling Personal Info of 24 Million People

8 Červen, 2022 - 09:57
An illicit online marketplace known as SSNDOB was taken down in operation led by U.S. law enforcement agencies, the Department of Justice (DoJ) announced Tuesday. SSNDOB trafficked in personal information such as names, dates of birth, credit card numbers, and Social Security numbers of about 24 million individuals in the U.S., generating its operators $19 million in sales revenue. The action
Kategorie: Hacking & Security

Hacking Scenarios: How Hackers Choose Their Victims

7 Červen, 2022 - 14:58
Enforcing the "double-extortion" technique aka pay-now-or-get-breached emerged as a head-turner last year.  May 6th, 2022 is a recent example. The State Department said the Conti strain of ransomware was the most costly in terms of payments made by victims as of January. Conti, a ransomware-as-a-service (RaaS) program, is one of the most notorious ransomware groups and has been responsible for
Kategorie: Hacking & Security

State-Backed Hackers Exploit Microsoft 'Follina' Bug to Target Entities in Europe and U.S

7 Červen, 2022 - 14:27
A suspected state-aligned threat actor has been attributed to a new set of attacks exploiting the Microsoft Office "Follina" vulnerability to target government entities in Europe and the U.S. Enterprise security firm Proofpoint said it blocked attempts at exploiting the remote code execution flaw, which is being tracked as CVE-2022-30190 (CVSS score: 7.8). No less than 1,000 phishing messages
Kategorie: Hacking & Security

Researchers Warn of Spam Campaign Targeting Victims with SVCReady Malware

7 Červen, 2022 - 14:26
A new wave of phishing campaigns has been observed spreading a previously documented malware called SVCReady. "The malware is notable for the unusual way it is delivered to target PCs — using shellcode hidden in the properties of Microsoft Office documents," Patrick Schläpfer, a threat analyst at HP, said in a technical write-up. SVCReady is said to be in its early stage of development, with the
Kategorie: Hacking & Security

10 Most Prolific Banking Trojans Targeting Hundreds of Financial Apps with Over a Billion Users

7 Červen, 2022 - 07:15
10 of the most prolific mobile banking trojans have set their eyes on 639 financial applications that are available on the Google Play Store and have been cumulatively downloaded over 1.01 billion times. Some of the most targeted apps include Walmart-backed PhonePe, Binance, Cash App, Garanti BBVA Mobile, La Banque Postale, Ma Banque, Caf - Mon Compte, Postepay, and BBVA México. These apps alone
Kategorie: Hacking & Security

Unpatched Critical Flaws Disclosed in U-Boot Bootloader for Embedded Devices

6 Červen, 2022 - 16:04
Cybersecurity researchers have disclosed two unpatched security vulnerabilities in the open-source U-Boot boot loader. The issues, which were uncovered in the IP defragmentation algorithm implemented in U-Boot by NCC Group, could be abused to achieve arbitrary out-of-bounds write and denial-of-service (DoS). U-Boot is a boot loader used in Linux-based embedded systems such as ChromeOS as well as
Kategorie: Hacking & Security