HackDig : Dig high-quality web security articles for hackers

IT threat evolution Q1 2020

Targeted attacks and malware campaigns Operation AppleJeus: the sequel In 2018, we published a report on Operation AppleJeus, one of the more notable campaigns of the threat actor Lazarus, currently one of the most active and prolific APT groups. One notable feature of this campaign was that it marked the first time Lazarus had targeted macOS targets, with t
Publish At:2020-05-24 07:11 | Read:229 | Comments:0 | Tags:Featured Malware reports Apple iOS Apple MacOS APT Data leak

APT trends report Q1 2020

For more than two years, the Global Research and Analysis Team (GReAT) at Kaspersky has been publishing quarterly summaries of advanced persistent threat (APT) activity. The summaries are based on our threat intelligence research and provide a representative snapshot of what we have published and discussed in greater detail in our private APT reports. They a
Publish At:2020-05-03 08:09 | Read:309 | Comments:0 | Tags:APT reports Featured Apple iOS APT Backdoor Chinese-speaking

iOS exploit chain deploys LightSpy feature-rich malware

A watering hole was discovered on January 10, 2020 utilizing a full remote iOS exploit chain to deploy a feature-rich implant named LightSpy. The site appears to have been designed to target users in Hong Kong based on the content of the landing page. Since the initial activity, we released two private reports exhaustively detailing spread, exploits, infrast
Publish At:2020-03-26 14:33 | Read:622 | Comments:0 | Tags:APT reports Featured Apple iOS APT Backdoor Google Android I

APT trends report Q3 2019

For more than two years, the Global Research and Analysis Team (GReAT) at Kaspersky has been publishing quarterly summaries of advanced persistent threat (APT) activity. The summaries are based on our threat intelligence research and provide a representative snapshot of what we have published and discussed in greater detail in our private APT reports. They a
Publish At:2019-10-16 06:25 | Read:1082 | Comments:0 | Tags:APT reports Featured Apple iOS APT Browser Chinese-speaking

SideStepper method allows to infect iOS devices via MDM Solutions

SideStepper is a method to install malicious apps on iOS devices by abusing the mobile device management (MDM) solutions. Security researchers from the Check Point firm have devised a method to install a malicious code on iOS devices by abusing the mobile device management (MDM) solutions used by many enterprises. The technique relies on a vulnerability dubb
Publish At:2016-04-01 03:35 | Read:4329 | Comments:0 | Tags:Breaking News Hacking Mobile Security Apple iOS iOS malware

Targeted Mobile Implants in the Age of Cyber-Espionage

Background When mass-produced electronic spying programs became widely known by the public, many email providers, businesses, and individuals started to use data encryption. Some of them have implemented forced encryption solutions to server connections, while others went further and implemented end-to-end encryption for data transmission as well as server s
Publish At:2016-01-18 08:25 | Read:6330 | Comments:0 | Tags:Blog Research Android Apple iOS Blackberry Windows Mobile

Apple iOS flaw exploitable to steal user password with a phishing email

A security expert demonstrated how to exploit a vulnerability in Apple IOS system to steal user password with a phishing email. A new vulnerability that affects Apple’s iOS could be exploited by hackers to collect user passwords by using a single email. Jan Soucek (@jansoucek) , a forensic expert at Ernst and Young has d
Publish At:2015-06-11 17:40 | Read:4176 | Comments:0 | Tags:Breaking News Hacking Mobile Apple Apple iOS iOS iPhone mobi

FireEye Assessment of 7 Million iOS and Android Apps shows a disconcerting scenario

FireEye released a report containing the results of a comprehensive Mobile Threat Assessment of 7 Million iOS and Android Apps. According to U.S. firm FireEye, more than five billion downloaded Android apps are vulnerable to cyber attacks due to the presence of security vulnerabilities in the Android OS. Researchers at FireE
Publish At:2015-02-28 18:45 | Read:4267 | Comments:0 | Tags:Breaking News Mobile Android Apple iOS jailbroken device mal

With employee help, ID theft ring allegedly stole $700,000 in Apple gift cards

Apple products are some of the most expensive and desirable in tech so it makes sense that the company’s gift cards are proving an attractive currency for criminals.On Thursday, the Manhattan District Attorney’s office said it has indicted five people for using personal information stolen from around 200 people to fund the purchase of hundreds of thousands o
Publish At:2015-02-06 05:45 | Read:4041 | Comments:0 | Tags:Security Security Laptops Mac Hardware iPhones iOS Apple iOS

New spyware targets iOS devices, steals pictures and data

A team of hackers that target governments, the military and journalists has turned its attention to the iPhone, according to Trend Micro.The computer security company says it has discovered new spyware that infects iPhones, gathers large amounts of personal information and sends it to a remote server.The spyware, called XAgent, is delivered via a phishing at
Publish At:2015-02-04 22:40 | Read:2682 | Comments:0 | Tags:iPhones iOS Apple iOS Security Mobile Security Mobile Device

Vulnerability Leaves iPhones Open to Fake App Attack

Security researchers have discovered a vulnerability in iPhones and iPads that allows attackers to install fake apps that take the place of legitimate ones.FireEye, a mobile security company based in California, said the problem, which it calls "Masque Attack," allows attackers to potentially gain access to vast amounts of personal information.In a video dem
Publish At:2014-11-10 22:10 | Read:3661 | Comments:0 | Tags:Security Mobile Security Mobile Device Management (MDM) iPho

The iPhone WireLurker Malware - What You Need to Know

There's a scary new piece of malware that collects call logs, phone-book contacts and other sensitive information from Apple iPhones and iPads. Should you be worried?The malware was first discovered by researchers at Palo Alto Networks who dubbed it WireLurker and said it exhibited behavior that had never been seen before in malicious software targeting Appl
Publish At:2014-11-08 02:40 | Read:2700 | Comments:0 | Tags:Security Malware Mobile Security Mobile Device Management (M

Apple CEO Tim Cook meets with Chinese official after iCloud attack

Just after Apple’s iCloud service faced a hacking attack from China, Apple CEO Tim Cook met with a Chinese official on Wednesday to discuss protecting users’ privacy.Cook met with Chinese Vice Premier Ma Kai in Beijing to talk about “strengthening” cooperation in the telecommunication sector, in addition to discussing security issues and other topics, China’
Publish At:2014-10-22 19:05 | Read:3295 | Comments:0 | Tags:Security Security Government Regulation Business iPhones iOS

China clears iPhone 6 for sale only after security tweaks

China has effectively cleared the iPhone 6 for sale in the country, granting the product a license, but not before a government regulator demanded Apple make some security changes in the iOS operating system to fix suspected flaws in the software.China’s Ministry of Industry and Information Technology (MIIT) recently granted the iPhone 6 a network access lic
Publish At:2014-09-30 15:00 | Read:2731 | Comments:0 | Tags:Government Regulation Business Security Security iPhones iOS

California passes law mandating smartphone kill switch

Smartphones sold in California will soon be required to have a kill switch that lets users remotely lock them and wipe them of data in the event they are lost or stolen.The demand is the result of a new law, signed into effect on Monday, that applies to phones manufactured after July 1, 2015, and sold in the state.While its legal reach does not extend beyond
Publish At:2014-08-26 03:50 | Read:3658 | Comments:0 | Tags:iPhones iOS Apple iOS Android Legal Malware/Cybercrime Secur

Tools

Tag Cloud