Blog

Mac Malware Utilized by Hacking Group APT32 to Attack Servers

Mac Malware Utilized by Hacking Group APT32 to Attack Servers

A newly identified MacOS backdoor detected by AV companies as OSX_OCEANLOTUS.D that is perceived as the latest version of a threat used by OceanLotus (a.k.a. APT 32, APT-C-00, SeaLotus, and Cobalt Kitty).   OceanLotus was responsible for launching targeted attacks against human rights organizations, media organizations, research institutes, and maritime construction firms. The attackers behind OSX_OCEANLOTUS.D...
Continue Reading
New MacOS Phishing Scheme Found

New MacOS Phishing Scheme Found

The 2017 version of OSX.Dok used a fake Preview icon to disguise an application bundle. The malware apparently targeted mostly European Mac users and was spread via an email phishing campaign that attempted to convince the user there was some problem with their tax returns.   A similar trick is used in the new version, only...
Continue Reading
Info-stealing malware targeting android phone users | Malware Trojan

Info-stealing malware exploits bouncing golf campaign targeting android phone users

Security Researchers recently discovered a new malware trojan called GolfSpythat targets android phone users in the Middle East and was designed to steal personal information and potentially take control over mobile devices.The malware’s cyberespionage campaign was named “Bouncing Golf”based on the malware’s code in the package named “golf.”This info-stealing malware is known for its wide range...
Continue Reading
Data breach

Unprotected Evite website containing customers’ data exposed in a data leak

A social planning and e-invitations service company named Evite detected a security breach when anunauthorized party acquired an inactive data storage file associated with the firm’s user accounts last April 15, 2019. This storage file contains customer’s information which includes names, usernames, email addresses, passwords, dates of birth, phone numbers, and mailing addresses.   Among the...
Continue Reading

Massive data leaks hit Oregon State University exposing hundreds of students’ information

Recently, a successful cyberattack hit Oregon State University compromising personal information of hundreds of students including their family members. The university announced that a total of 636 students and family’s records containing personally identifiable information were compromised due to a cyberattack that occurred in early May 2019.   Individuals outside the university hacked an OSU employee’s...
Continue Reading
Malware and Adware Attacks Using WP Plugins

Malware and Adware Attacks Using WP Plugins

With each passing day, cases of WordPress infection that redirects visitors to suspicious pages is getting common.  Recently, a vulnerability was discovered in tag Div Themes and Ultimate Member Plugins. In this WordPress redirect hack visitors to your website are redirected to phishing or malicious pages.   In this hack, users, when redirected, are taken to...
Continue Reading

MimiKatz Ransomware – Specially designed for Hacking

In this day and age, digital aggressors are consistently gaining ground in their hacking apparatuses and systems so as to accomplish a greater vindictive plan. Be that as it may, this does not mean they are for saking the essential instruments, methods, and systems when leading a digital assault.   Indeed, a large portion of the...
Continue Reading
UK Identity Theft and Cyber Fraud | Identity Fraud Prevention

UK Identity Theft and Cyber Fraud reaches its highest record level

As the years passed by, the rate of identity fraud and cyber fraud around UK rapidly increased causing to reach its highest record level this year. Researchers identified over 300,000 cases of fraudulent conduct recorded to the National Fraud Database in 2017, with data drawn from 306 organizations, including many major UK brands.Although these incidents were...
Continue Reading
online fraud prevention

Malicious hacker breaches EatStreet’s database exposing data of 6 million customers

A Wisconsin-based company named EatStreetis one of many successful businesses around US when it comes to online food ordering and delivery services. With more than 100,000 installs in the company’s android app on Google Play store, EatStreet is one of the leading online and mobile food ordering service currently servicing over 15,000 restaurants in more than...
Continue Reading
Malicious hackers break into NASA’s network systems

Malicious hackers break into NASA’s network systems

The U.S. National Aeronautics and Space Administration (NASA) published an audit document from the U.S. Office of the Inspector General confirming that its Jet Propulsion Laboratory (JPL) has been hacked this week. Based on the audit report, it was found out that the cybercriminals hacked multiple IT security control reducing JPL’s ability to prevent, detect, and...
Continue Reading

US Firm Suffers Data Breach – Cards Data Posted on DarkNet

In a statement posted to its Web site today, Orlando, Fla. based hospitality firm Earl Enterprises said a data breach involving malware installed on its point-of-sale systems allowed cyber thieves to steal card details from customers between May 23, 2018 and March 18, 2019.   According to an analysis of that page, it appears the data...
Continue Reading
phishing attacks

Hackers sending over 3 billion fake emails daily to conduct phishing attacks

Every day, hackers send out over 3.5 billion fake emails worldwide targeting companies to spear-phishing and spoofing cyberattacks. Most companies remain vulnerable to these phishing attacks simply because they’re not implementing industry-standard authentication protocols. Vast majority of these suspicious emails were found out to came from U.S.-based sources. Spear-phishing, as distinguished from regular phishing scams, is...
Continue Reading
hacking group | Malware check | Malware trojan

FIN8 Hacking Group backs to business with updated ShellTea backdoor

After being silent for almost two years, cybersecurity researchers made malware check and found out that FIN8 Hacking Group has returned, devising a new method of hacking the hotel-entertainment industry using an updated version of a malware trojan known as ShellTea/PunchBuggy Backdoor.This attack was thought to be the first attack delivered by the FIN8 group in...
Continue Reading
phishing sites

FBI warns users to be wary of phishing sites abusing HTTPS

Summary HTTPS green padlock symbol may no longer indicate secured connection. Analysis There has been a steady increase in threat actors’ use of SSL certificates to add an air of legitimacy to malicious websites. Since 2017 almost a third of phishing sites had SSL certificates, meaning their URLs began with HTTPS:// and (most) browsers displayed the...
Continue Reading
phishing scams

Phishing Scam Asks You to Login to Read Encrypted Message

New phishing campaign is in circulation requiring users to login to a fraudulent OneDrive site in order to unveil an encrypted message. Analysis • A believed to be phishing emails with subject similar to ‘Encrypted Message Received’ and includes a link stating ‘View Encrypted Email’. • Message link will divert the user to a fake OneDrive...
Continue Reading
anti trojan solution | Triada Android Trojan

Google Confirms Android Smartphone Security Backdoor

Summary Triada Trojan has been found in the firmware of various low-cost Android devices, which could be used to steal sensitive data and run cyber espionage modules. Analysis : First seen in March 2016 and labelled as the most advance mobile Trojan during that time specifically engineered as Android banking trojan. Android system images were infected...
Continue Reading
site take down

Cyberattack hits Radiohead’s unreleased music track

A cyberattacker hacked The English rock band Radiohead stealing private minidisk archive from the band’s third album and subsequent major worldwide hit ‘OK Computer’and threatened to leak them in an extortion scheme if they will not pay the ransom costing $150,000. Jonny Greenwood, Radiohead guitarist and keyboardist of the band, said that a hacker last week...
Continue Reading
Hackers Can Utilize Hardware Vulnerability of Chips to Perform Remote Attacks

Hackers Can Utilize Hardware Vulnerability of Chips to Perform Remote Attacks

Qualcomm chipsets are generally the processor of choice for many smartphone users, owing to the firm’s powerful graphics hardware and developer-friendly nature. It’s not immune to security flaws though, and its latest vulnerability is a big one.   Security researchers discovered the flaw last year, allowing cyber-criminals to gain private data and security keys in a...
Continue Reading
Cyber Security

Chinese Hacking Group Gaining Ground in the Philippines and US

An advanced persistent threat group linked to the Chinese government accused of conducting a widespread cyber espionage campaign against IT service providers has gone quiet since two of its members were indicted by the Department of Justice last year, according to a Department of Homeland Security official, but it remains an active threat to American businesses,...
Continue Reading
malware

Malware Turns Android Mobile Devices into Tunnel Proxies

Another Android malware named TimpDoor has been found by security specialists. The malware is being circulated as a major aspect of a phishing effort and is being sent to exploited people’s SMS messages.   The hackers behind the battle trap exploited people into downloading and introducing a phony voice-message application that contains TimpDoor.   Once the...
Continue Reading
1 2 3 4 15