HackDig : Dig high-quality web security articles for hacker

Erebus Resurfaces as Linux Ransomware

by Ziv Chang, Gilbert Sison, and Jeanne Jocson On June 10, South Korean web hosting company NAYANA was hit by Erebus ransomware (detected by Trend Micro as RANSOM_ELFEREBUS.A), infecting 153 Linux servers and over 3,400 business websites the company hosts. In a notice posted on NAYANA’s website last June 12, the company shared that the attackers demanded an
Publish At:2017-06-19 17:25 | Read:2987 | Comments:0 | Tags:Ransomware Erebus Linux ransomware

50 hashes per hour

How often do you turn off your computer when you go home from work? We bet you leave it on so you don’t have to wait until it boots up in the morning. It’s possible that your IT staff have trained you to lock your system for security reasons whenever you leave your workplace. But locking your system won’t save your computer from a new type
Publish At:2017-06-06 08:30 | Read:3906 | Comments:0 | Tags:Blog Research Data leaks Data Protection Linux Security Poli

A recently discovered Linux flaw could be exploited by Sudo Users to gain Root Privileges

Security researchers at Qualys Security have discovered a Linux Flaw that could be exploited to escalate privileges and overwrite any file on the filesystem. Security researchers at Qualys Security have discovered a Linux flaw that could be exploited to gain root privileges and overwrite any file on the filesystem on SELinux-enabled systems. The high severit
Publish At:2017-05-31 17:55 | Read:2634 | Comments:0 | Tags:Breaking News Hacking LINUX Linux flaw privileges escalation

Linux Shishiga malware, a threat in dangerous evolution

Malware researchers from security firm ESET have discovered a new Linux threat dubbed Shishiga malware targeting systems in the wild. Malware researchers from ESET have discovered a new Linux malware dubbed Linux/Shishiga targeting systems in the wild. The Linux/Shishiga malware uses four different protocols (SSH, Telnet, HTTP and BitTorrent) implements a mo
Publish At:2017-04-26 07:50 | Read:2922 | Comments:0 | Tags:Breaking News Cyber Crime Malware brute force Cybercrime LIN

Russian Man Pleads Guilty to Orchestrating Ebury Botnet Conspiracy

A Russian man has pleaded guilty to helping to create and operate a botnet of tens of thousands of machines infected with Ebury malware.On 28 March 2017, Maxim Senakh, 41, of Velikii Novgorod, Russia pleaded guilty to a conspiracy to violate the Computer Fraud and Abuse Act and conspiracy to commit wire fraud. Law enforcement originally indicted Senakh on 13
Publish At:2017-03-29 19:45 | Read:2818 | Comments:0 | Tags:Latest Security News Fraud Linux malware

CVE-2017-2636 Linux kernel flaw was spotted after seven years and quickly fixed

A flaw recently fixed in the Linux kernel tracked as CVE-2017-2636 might have been exploited to gain privilege escalation or cause a DoS condition. The security expert Alexander Popov from Positive Technologies has discovered a race condition in the n_hdlc driver that might be exploited by attackers for privilege escalation in the operating system. The vuln
Publish At:2017-03-16 19:55 | Read:3800 | Comments:0 | Tags:Breaking News Hacking CVE-2017-2636 kernel flaw LINUX

CVE-2017-6074 – a new 11-year old Linux Kernel flaw discovered

Security expert discovered a new 11-year old privilege escalation vulnerability, tracked as CVE-2017-6074, in the Linux kernel. A new privilege escalation vulnerability, tracked as CVE-2017-6074, has been discovered in the Linux kernel and the astonishing new is that it is an 11-year old flaw. The local privilege-escalation vulnerability, discovered by secur
Publish At:2017-02-22 21:30 | Read:2932 | Comments:0 | Tags:Breaking News Hacking CVE-2017-6074 LINUX Linux Kernel privi

Unix: A Game Changer in the Ransomware Landscape?

by Joachim Suico (Threat Research Engineer) 2016 was the year when ransomware reigned. Bad guys further weaponized extortion into malware, turning enterprises and end users into their cash cows by taking their crown jewels hostage. With 146 families discovered last year compared to 29 in 2015, the rapid expansion and development of ransomware is projected to
Publish At:2017-02-13 22:40 | Read:3711 | Comments:0 | Tags:Ransomware Linux Mac OSX ransomware Unix

Android and Linux, the Technologies with the Most Security Holes in 2016

The latest version of Google’s mobile operating system, Android Nougat, has quite a few security improvements over older versions and, in fact, its arrival on the market is more than necessary. Not for nothing,  Android has managed to win the dubious honor of being the product with the most security vulnerabilities discovered in 2016. According to the
Publish At:2017-02-03 07:45 | Read:2497 | Comments:0 | Tags:Security Android Linux news

Several thousand Linux devices infected with the Linux.Proxy.10 Trojan

According to the security firm Dr. Web , thousands of Linux-based devices have already been infected with the Linux.Proxy.10 Trojan. A new Trojan dubbed Linux.Proxy.10 is targeting Linux-based devices transforming them into proxy servers that are used by attackers to protect their anonymity while launching cyber attacks from the hacked systems. Linux.Proxy.1
Publish At:2017-01-26 05:50 | Read:3159 | Comments:0 | Tags:Breaking News Cyber Crime Malware backdoor Cybercrime LINUX

Linux Paranoia

If you’re the paranoid type, you don’t deny people are watching – you know they are. You encrypt your drives, use SSL-VPN, tor, proxies, and run tails. If not, then you at least care about privacy or have something to hide. This post is for you people. In the following example, it’s a bit extreme, but it works well. What I want to go
Publish At:2017-01-23 07:15 | Read:3040 | Comments:0 | Tags:code Joe you evil bastard linux

Linux/Rakos, the new Linux malware threatening devices and servers

A new Linux malware, dubbed Linux/Rakos is threatening devices and servers. The malware searches for victims via SSH scan. A new Linux malware, dubbed Linux/Rakos is threatening devices and servers. The malicious code is written in the Go language and the binary is usually compressed with the standard  UPX tool. Apparently, frustrated users complain more oft
Publish At:2016-12-21 12:50 | Read:2691 | Comments:0 | Tags:Breaking News Cyber Crime Internet of Things Malware Hacking

10 Security Tips for Linux Post-Install

Ask any geek and they’ll tell you how fun it is to install Linux on a new machine. Whether you’re trying out a new distro or installing an upgraded version, there is something cathartic about jumping on the Linux bandwagon and hacking away on a new system.Although Linux by nature is more secure than Windows, there are still steps that need to be
Publish At:2016-12-20 16:35 | Read:4265 | Comments:0 | Tags:Featured Articles Security Awareness Linux security

Security expert disclosed a full zero-day drive-by exploit for Linux leveraging SNES

The security expert Chris Evans has disclosed a zero-day exploit successfully tested on Ubuntu and Fedora distributions that may affect other distros. The security expert Chris Evans has disclosed a zero-day exploit for Ubuntu and Fedora distributions. The flaw is a full drive-by download exploit that may impact also other Linux distributions. The researcher
Publish At:2016-12-18 11:10 | Read:3793 | Comments:0 | Tags:Breaking News Hacking exploit Fedora full 0-day drive-by exp

Hacking Ubuntu Linux distro exploiting the CrashDB code injection issue

The exploitation of the CrashDB code injection issue could allow an attacker to remotely execute arbitrary code on machines running Ubuntu Linux distro. New problems for Ubuntu Linux distribution, the security expert Donncha O’Cearbhaill discovered a critical vulnerability that could be exploited by a remote attacker to compromise a target computer usi
Publish At:2016-12-16 22:10 | Read:3006 | Comments:0 | Tags:Hacking CrashDB LINUX RCE Ubuntu Linux exploit


Share high-quality web security related articles with you:)


Tag Cloud