BlackMatter Ransomware Flaw Threat Group Cybercrime DarkSide Colonial Pipeline

Security researchers outsmart BlackMatter ransomware by discovering a flaw within its payloads

A flaw in the BlackMatter ransomware threat actors’ code that had them lost millions in profit was discovered by cybersecurity researchers. The flaw enables the recovery of encrypted data without needing to pay ransom demands to the threat actors.  BlackMatter’s existence in the cybercrime ecosystem has been longer than its current re-emergence after temporarily leaving the scene. Analysts believed that the DarkSide ransomware is a rebranded version of BlackMatter. The DarkSide ransomware is also the threat group...
Continue Reading
hackers Asia Telecom Malware Harvester data breach threat actors

Custom Malware used by hackers to infiltrate Asian-Telco Companies

In recent attacks, an unknown state-sponsored threat group used a malware toolset targeting several IT firms and telecommunication providers in Asian countries, especially the southern part of the continent.  The researchers found a tool called Harvester. The threat group uses it to gather essential data in a top-tier espionage campaign against a vital part of a country’s system, such as IT firms,...
Continue Reading
Free Decryptor BlackByte Ransomware cybersecurity anti malware anti phishing scams malware detection

Free Decryptor for BlackByte Ransomware was released

Previous cyberattack victims of known ransomware BlackByte can rejoice since a free decryptor has been released to the public. If the decryptor is executed, ransomware will generate an original encryption key per file or a key per machine called session keys utilized to encrypt a target’s device.  These keys are then encrypted with a public Rivest–Shamir–Adleman key and attached to the end of...
Continue Reading
Credentials crypto funds compromised QR Codes scams credential phishing identity theft frauds

Credentials and crypto funds stolen by compromised QR Codes

Quick Responses codes, or famously known as QR codes, are used to track product information in a supply chain. These QR codes have several functions: bill payment, product checker, website shortcuts, online shop shortcuts, and many more. However, even the QR codes’ functionality is intended for the excellent use of people; there are times when several criminals commit...
Continue Reading
Non fungible token Malicious NFT OpenSea Marketplace bug cryptocurrency digital-wallets fraud alert fraud-detection

Malicious NFT could have infiltrated OpenSea Marketplace via discovered bug

Currently, the OpenSea marketplace is at risk of being infiltrated by threat actors. Uploading malicious non-fungible tokens or NFT can become a transmitter for hackers attempting to heist digital wallet funds.  Severe security issues inside the OpenSea non-fungible token marketplace that enabled attackers to gather cryptocurrency wallet funds have been patched.  Meanwhile, the non-fungible tokens, also known as NFT, are digitally owned assets...
Continue Reading
BillQuick zero day bug Cybercriminals billing software vulnerability cybersecurity

BillQuick billing system’s zero-day bug targeted by Cybercriminals

Recently, researchers discovered that a critical structured query language’s bug exists inside BillQuick Web Suite and is exploited by an unidentified malicious threat group. The billing system created by a particular billing software group has about 400,000 clients and users globally.  BillQuick is a unified project management software that targets different companies that need simple accounting, billing, and time-tracking capabilities....
Continue Reading
Russia REvil Ransomware TOR sites compromised dark web the onion router

Russia’s REvil Ransomware halts operation as their TOR sites were compromised

REvil ransomware group, Russia’s most notorious cybercriminal gang, known for their extortions, has shut down again after an unidentified individual hijacked their data leak blog and the onion router payment portal.  The ‘The onion router’ shuts down recently. A malicious actor associated with the REvil group announces that somebody caused problems to the ransomware group’s domain to the XSS hacking...
Continue Reading
Visible account manipulations Networking tech company e commerce online shopping telecom

People are setting Visible on fire due to multiple account manipulations

Visible, a Verizon-owned company and an all-digital wireless carrier in the United States that offers unlimited text, calls, video calls, data, hot spots and many more, is receiving many backlashes from its users due to account manipulation.  The company is currently receiving overwhelming criticism from their users, who took it to social media stating that their accounts had been...
Continue Reading
Phishing campaign DocuSign trick employees online fraud

Phishing campaign takes advantage of DocuSign to trick lower-tier employees

Today, Phishing campaigns conducted by many threat actors follow a new way of targeting non-executive employees with access to essential areas inside an organization or company, especially the use of DocuSign.  As reported by researchers, fifty percent of all phishing emails they examined in recent weeks impersonated lower-class employees. Up to 77% of them targeted the same group of employees...
Continue Reading
APAC digital payment transactions cybersecurity awareness  it security

As APAC found to be the largest contributor to digital payment transactions, cybersecurity awareness becomes more vital 

Public awareness of cybersecurity is still not prevalent even up to today. Since the devastation of the COVID-19 pandemic worldwide, digital payment transactions have also seen an upsurge – making many people more exposed to threats of cyberattacks.   A security researcher’s study revealed that about 90% of Asian respondents had utilised mobile payment applications in everyday digital payment transactions.  Moreover, 2 out...
Continue Reading
Threat actors hack account Telegram bots OTP Stealing

Threat actors hack into victims’ accounts via Telegram bots that steal OTPs 

Illegal services that allow threat actors to evade the protection that two-factor authentication (2FA) brings are rampant in underground forums.  While 2FA is the most helpful method of protecting a user’s privacy against criminals hacking into their accounts, threat actors have also found a way to sidestep the protection. One of these is the usage of bots on...
Continue Reading
profile impersonations fake accounts Facebook Fraud Prevention social media

The state of impersonations and fake profiles in the Facebook landscape: Is it being tolerated?

Among several other criticisms that the Facebook platform faces each day, one of the most significant issues is how fake accounts and profile impersonations have gone rogue in the platform.   Reports say that billions of fake accounts have already been purged by Facebook in the past years, and yet, a vast number still emerges day by day. It is impossible...
Continue Reading
Serious risk patients recall Medtronic Insulin Pump devices FDA vulnerability exploit

Serious risk to patients prompted the recall of Medtronic Insulin Pump devices via FDA

Earlier this week, the US Food and Drug Administration issued an advisory that warns the patients about the risk of the Medtronic insulin pump devices used for wireless insulin pumps. The FDA also initiated an expanded recall of the remote-controlled pumps.  The FDA identified the situation as a “Class I” recall due to the severity of the incident. It is placed...
Continue Reading
Ransomware CIS 2021 BigBobRoss CryptConsole Cryakl Phobos CrySIS

Ransomware strains that targeted the CIS for 2021

This year has been challenging for businesses, especially with the pandemic outbreak. Several threat actors have taken advantage of executing cyberattacks against organizations worldwide, ransomware being the most common type. System of government such as the Commonwealth of Independent States (CIS) also failed to avoid such unfortunate occurrences of attacks for this year.     Businesses that operate inside the CIS have been the targets of non-prevalent ransomware threat groups.    Described below is the...
Continue Reading
Journalists whistleblower sharing platform Onionshare bugs vulnerability exploit

Journalists and whistleblower sharing platform Onionshare, revealed bugs through the latest patch

OnionShare a file-sharing system used by journalists and whistleblowers to confidentially send information to any target location has revealed two vulnerabilities to their latest patch. If these bugs were not identified early, it might heavily impact the file-sharing system’s anonymous capabilities.  The system allows users to carry out activities including file sharing, messaging, and website hosting while being anonymous at...
Continue Reading
Large companies domain security enhancement cyberattacks DNS

Large companies lag in domain security enhancement adoption in preventing cyberattacks

Many studies state that web domains of large companies remain to be dangerously under-guarded against the threat of cyberattacks despite the world’s shift to a more modernize business and operations landscape. At least 81% of companies listed in Forbes Global 2000 are not using registry locks, which means that these companies have a lag in adopting enhanced domain security measures. ...
Continue Reading
Ethernet cables data exfiltration air gapped systems malware

Ethernet cables are being used in a newfound data exfiltration mechanism against air-gapped systems

The latest research has found a new data exfiltration mechanism that utilizes Ethernet cables as a transmitting antenna tool in siphoning sensitive data furtively from air-gapped systems. A security analyst stated that it is an interesting concern how the wires that are supposed to protect air-gap systems become the cause of vulnerability in attacks.  This new data exfiltration mechanism called “LANtenna Attack” allows malicious codes found in air-gapped...
Continue Reading
Two step verification Google users user account security

Two-step verification now required to millions of Google users for additional user account security

A publication was released by Google recently regarding the company’s plans of increasing user account security. This plan includes an aim to auto-enroll 150 million Google users into a two-step verification or 2SV process by the end of 2021 and oblige more than 2 million YouTube creators to activate the 2SV.  To improve user account security, Google takes a new step and fosters its existing measures such as...
Continue Reading
Luxury department store Neiman Marcus data breach compromised data

Luxury department store, Neiman Marcus, gets hit by data breach affecting millions

Neiman Marcus, an American luxury department store chain in the ownership of Neiman Marcus Group (NMG) located in Dallas, Texas, has warned millions of their worldwide clients about their online accounts being susceptible to a major data breach. The impacted customers have reached over 4.6 million people, of which they have sent notifications regarding the attack that may have begun by May last year.  From the clients’...
Continue Reading
GriftHorse Trojan malware infects Android devices

GriftHorse Trojan infects over 10 million Android devices worldwide

Over 10 million Android devices from more than 70 countries have reportedly been infected by a large-scale malware campaign wherein victims are unknowingly deceived into subscribing to many expensive paid services. GriftHorse trojan is the malware used for the campaign that is now active for about five months.    A GriftHorse Trojan infected Android devices are subscribed to expensive premium services, allowing threat...
Continue Reading
1 2 3 4 5 6 37