HackDig : Dig high-quality web security articles

The Four Element Sword, weaponized document builder used in APT Attacks

Experts analyzed a dozen attacks that leveraged on malicious RTF documents created using the same Four Element Sword builder. Security experts at Arbor Networks’ Security Engineering and Response Team (ASERT) have spotted a tool used in advanced persistent threat (APT) attacks against organizations in East Asia. The researchers have analyzed a dozen attacks
Publish At:2016-04-19 19:20 | Read:6014 | Comments:0 | Tags:Breaking News Cyber Crime Cyber warfare Hacking APT China CV

Operation Buhtrap: New Spyware is targeting Russian Banking Sector

ESET has discovered a new hacking campaign dubbed Operation Buhtrap based on a family of spyware targeting vulnerabilities within the Russian Windows System. Late in 2014 analysts at ESET uncovered CVE-2012-0158, a buffer overflow vulnerability in the ListView / TreeView ActiveX controls in the MSCOMCTL.OCX library.  This part
Publish At:2015-04-10 10:35 | Read:5903 | Comments:0 | Tags:Breaking News Cyber Crime Hacking Malware Banking sector Buh

Gh0st RAT used in targeted attacks against Tibetan activists

APT actors trying to use the G20 2014 summit as a lure to compromise Tibetan nongovernmental organizations (NGOs) with Gh0st RAT. Security experts at ESET uncovered a new series of cyber attacks that targeted Tibetan nongovernmental organizations (NGOs) concurrently with the G20 2014 summit in Brisbane, Australia. The expert
Publish At:2014-11-19 15:25 | Read:5173 | Comments:0 | Tags:Cyber Crime Security APT CVE-2012-0158 cyber espionage Eset

Windows Registry Infecting Malware Has NO Files

This is a pretty interesting use of the Windows Registry and reminds me a little of the transient drive-by malware used last year against Internet Explorer that left no files either – Another IE 0-Day Hole Found & Used By In-Memory Drive By Attacks.The main difference being, that wasn’t persistent and as it lived in RAM, it wouldn’t su
Publish At:2014-08-15 09:48 | Read:4706 | Comments:0 | Tags:Malware Windows Hacking CVE-2012-0158 poweliks rascagneres r


Share high-quality web security related articles with you:)
Tell me why you support me <3