HackDig : Dig high-quality web security articles for hackers

Windows 10 now lets you mount Linux ext4 filesystems in WSL 2

Windows 10 now allows you to mount physical disks formatted using the Linux ext4 filesystem in the Windows Subsystem for Linux 2.Linux filesystems, such as ext4, cannot be natively accessed in Windows 10 without installing special drivers.Starting with Windows 10 preview build 20211, WSL 2 now includes a wsl --mount command that lets you mount
Publish At:2020-09-10 16:20 | Read:131 | Comments:0 | Tags:Microsoft Linux

CDRThief Linux malware steals VoIP metadata from Linux softswitches

ESET researchers discovered a new piece of malware dubbed CDRThief targets a specific Voice over IP system to steal call data records (CDR). Security experts from ESET discovered a new piece of malware, tracked as CDRThief, that targets the Linux VoIP platform, Linknat VOS2009/3000 softswitches, to steal call data records (CDR) from telephone exchange equ
Publish At:2020-09-10 13:30 | Read:167 | Comments:0 | Tags:Breaking News Hacking Malware CDRThief hacking news informat

An overview of targeted attacks and APTs on Linux

Perhaps unsurprisingly, a lot has been written about targeted attacks on Windows systems. Windows is, due to its popularity, the platform for which we discover most APT attack tools. At the same time, there’s a widely held opinion that Linux is a secure-by-default operating system that isn’t susceptible to malicious code. It’s certainly tru
Publish At:2020-09-10 06:04 | Read:139 | Comments:0 | Tags:Featured Publications APT Cyber espionage Linux Targeted Att

Lemon_Duck cryptomining malware evolves to target Linux devices

A new variant of the infamous Lemon_Duck cryptomining malware has been updated to targets Linux devices. Security researchers from Sophos have spotted a new variant of the Lemon_Duck cryptomining malware that has been updated to compromise Linux machines via SSH brute force attacks. The new variant also exploits SMBGhost
Publish At:2020-08-28 15:25 | Read:168 | Comments:0 | Tags:Breaking News Cyber Crime Digital ID Malware Cybercrime Hack

Lemon_Duck cryptominer malware now targets Linux devices

Image: Joshua ColemanThe Lemon_Duck cryptomining malware has been updated to compromise Linux machines via SSH brute force attacks, to exploit SMBGhost-vulnerable Windows systems, and to infect servers running Redis and Hadoop instances.Lemon_Duck (spotted last year by Trend Micro and further examined by SentinelOne) is known for tar
Publish At:2020-08-27 17:11 | Read:251 | Comments:0 | Tags:Security Linux

How to run Windows 10 programs in a WSL Linux shell

The Windows Subsystem for Linux is bridging the divide between Windows and Linux by letting you run Windows 10 programs directly within a Linux shell.One of the strengths of the Windows Subsystem for Linux (WSL) is that you not only can run a Linux distribution in Windows 10, but you also have the flexibility of running Windows 10 programs in Linux.This abil
Publish At:2020-08-22 12:02 | Read:193 | Comments:0 | Tags:Microsoft Linux

FritzFrog cryptocurrency P2P botnet targets Linux servers over SSH

Researchers spotted a new sophisticated peer-to-peer (P2P) botnet, dubbed FritzFrog, that has been actively targeting SSH servers since January 2020. FritzFrog is a new sophisticated botnet that has been actively targeting SSH servers worldwide since January 2020. The bot is written in Golang and implements wormable capabilities, experts reported atta
Publish At:2020-08-19 13:17 | Read:256 | Comments:0 | Tags:Breaking News Cyber Crime Digital ID Hacking Malware botnet

FBI and NSA joint report details APT28’s Linux malware Drovorub

The FBI and NSA issue joint alert related to new Linux malware dubbed Drovorub that has been used by the Russia-linked APT28 group. The FBI and NSA have published a joint security alert containing technical details about a new piece of Linux malware, tracked as Drovorub, allegedly employed by Russia-linked the APT28 group. The name comes from drovo [др
Publish At:2020-08-13 14:35 | Read:225 | Comments:0 | Tags:APT Breaking News Hacking Malware APT 28 Drovorub malware in

BootHole issue allows installing a stealthy and persistent malware

Billions of Windows and Linux devices are affected by a serious GRUB2 bootloader issue, dubbed BootHole, that can be exploited to install a stealthy malware. Billions of Windows and Linux devices are affected by a serious GRUB2 bootloader vulnerability, tracked as CVE-2020-10713 and dubbed BootHole, which can be exploited by attackers to install persisten
Publish At:2020-07-30 15:58 | Read:293 | Comments:0 | Tags:Breaking News Hacking BootHole Grub2 hacking news informatio

Doki, an undetectable Linux backdoor targets Docker Servers

Experts spotted an undetectable Linux malware that exploits undocumented techniques to evade detection and targets publicly accessible Docker servers Cybersecurity researchers at Intezer spotted a new completely undetectable Linux malware, dubbed Doki, that exploits undocumented evasion techniques while targeting publicly accessible Docker servers. Th
Publish At:2020-07-29 09:05 | Read:282 | Comments:0 | Tags:Breaking News Cyber Crime Digital ID Hacking Malware botnet

REMnux 7, a Linux toolkit for malware analysts released

A new version of the REMnux Linux toolkit for malware analysts is available for download, it includes a huge set of tools for professionals. REMnux is a Linux toolkit for reverse-engineering and dissecting software, it includes a collection of free tools created by the community that allows researchers to investigate malware. The toolkit was first rele
Publish At:2020-07-26 15:27 | Read:285 | Comments:0 | Tags:Breaking News Malware Hacking information security news IT I

MATA: Multi-platform targeted malware framework

As the IT and OT environment becomes more complex, adversaries are quick to adapt their attack strategy. For example, as users’ work environments diversify, adversaries are busy acquiring the TTPs to infiltrate systems. Recently, we reported to our Threat Intelligence Portal customers a similar malware framework that internally we called MATA. The MATA
Publish At:2020-07-22 06:56 | Read:346 | Comments:0 | Tags:APT reports Featured Apple MacOS APT Cybercrime Lazarus Linu

Project Freta, a free service that allows finding malware in OS memory snapshots

Microsoft launched Project Freta, a free service that allows users to find malware, including rootkit, in operating system memory snapshots. Microsoft has unveiled a new project, dubbed Project Freta, for the discovery of malicious code in operating system memory snapshots. The Project Freta is a cloud-based service that allows users to collect forensi
Publish At:2020-07-07 16:21 | Read:420 | Comments:0 | Tags:Breaking News Hacking hacking news information security news

New XORDDoS, Kaiji DDoS botnet variants target Docker servers

Operators behind XORDDoS and Kaiji DDoS botnets recently started targeting Docker servers exposed online, Trend Micro warns. Trend Micro researchers reported that operators behind XORDDoS and Kaiji DDoS botnets recently started targeting Docker servers exposed online. XORDDoS, also known as XOR.DDoS, first appeared in the threat landscape in 2014 it is
Publish At:2020-06-24 03:35 | Read:422 | Comments:0 | Tags:Breaking News Hacking Malware botnet Docker hacking news inf

Stealthworker botnet targets Windows and Linux servers

Researchers uncovered a malware campaign that is targeting Windows and Linux servers with a Golang-based malicious code called Stealthworker. Akamai researchers uncovered a malware campaign spreading a Golang-based malicious code tracked as Stealthworker. The malware targets Windows and Linux servers running popular web services and platforms including (i
Publish At:2020-06-08 05:23 | Read:397 | Comments:0 | Tags:Breaking News Cyber Crime Hacking Malware information securi

Tools

Tag Cloud