HackDig : Dig high-quality web security articles for hacker

Malware and HTTPS – a growing love affair

byPaul DucklinIf you’re a regular Naked Security reader, you’ll know that we’ve been fans of HTTPS for years.In fact, it’s nearly nine years since we published an open letter to Facebook urging the social networking giant to adopt HTTPS everywhere.HTTPS is short for HTTP-with-Security, and it means that your browser, which uses HTTP (
Publish At:2020-02-18 10:21 | Read:23 | Comments:0 | Tags:Cryptography Malware malware sophoslabs TLS

Banking Trojans and Ransomware — A Treacherous Matrimony Bound to Get Worse

The financial malware arena became a mainstream issue a little over a decade ago with the rise of malware like the Zeus Trojan, which at the time was the first commercial banking Trojan available to the cybercrime world. We have come a long way since, and the past decade saw banking Trojans become increasingly sophisticated, specialized and exclusive, operat
Publish At:2020-02-18 09:32 | Read:69 | Comments:0 | Tags:Malware Threat Intelligence Banking Trojan Botnets Cybercrim

AZORult Trojan Disguised Itself as Fake ProtonVPN Installer

Security researchers observed samples of the AZORult trojan disguising themselves as fake ProtonVPN installers for distribution.Back in November 2019, malicious actors launched this attack campaign by registering the domain “protonvpn[.]store” with a registrar based in Russia.One iteration of the campaign used malvertising as its initial infectio
Publish At:2020-02-18 09:23 | Read:98 | Comments:0 | Tags:Featured Articles IT Security and Data Protection Latest Sec

Launching the First “Yomi Hunting” Challenge!

About a year ago, Yoroi released the Yomi Hunter sandbox, today, they love to challenge the malware community with the first “Yomi Hunting” contest. About a year ago, we publicly released the Yomi Hunter sandbox for a few simple reasons: in Yoroi we believe in the InfoSec community value, we think it plays a central role in the fight of cyber-threats and
Publish At:2020-02-17 11:00 | Read:193 | Comments:0 | Tags:Breaking News Malware Hacking information security news it s

IDF soldiers tricked into installing malicious apps by Hamas operatives posing as attractive women

Israeli Force (IDF) announced it has thwarted an attempt by the Hamas militant group to hack soldiers’ phones by posing as attractive women on social media. Israeli Defence Force (IDF) announced it has thwarted an attempt by the Hamas militant group to hack soldiers’ mobile devices by posing as attractive women on social media and instant messaging apps
Publish At:2020-02-17 07:37 | Read:45 | Comments:0 | Tags:Breaking News Cyber warfare Hacking Malware Mobile Espionage

MoleRATs APT group targets Palestinian territories

Security experts uncovered a new cyberespionage campaign conducted by one of the Gaza Cybergang groups (aka MoleRATs) targeting the Middle East. Experts from the Cybereason Nocturnus team have uncovered a cyber espionage campaign allegedly carried out by one of the Gaza Cybergang groups (aka MoleRATs).  MoleRATs is an Arabic-speaking, politically motiv
Publish At:2020-02-15 17:31 | Read:245 | Comments:0 | Tags:APT Breaking News Cyber warfare Hacking Malware Gaza cyberga

PoS malware infected systems at 71 locations operated by US store chain Rutter’s

US store chain Rutter disclosed a security breach, 71 locations were infected with a point-of-sale (POS) malware used to steal customers’ credit card information. The Rutter’s, a U.S. convenience store, fast food restaurant, and gas station chain owner, has disclosed a security breach. The company confirmed that attackers gained access to
Publish At:2020-02-15 17:31 | Read:31 | Comments:0 | Tags:Breaking News Cyber Crime Data Breach Malware Security Cyber

US Govt agencies detail North Korea-linked HIDDEN COBRA malware

The Federal Bureau of Investigation (FBI) and Cybersecurity and Infrastructure Security Agency (CISA) released reports on North Korea-linked HIDDEN COBRA malware. The FBI, the US Cyber Command, and the Department of Homeland Security have published technical details of a new North-Korea linked hacking operation. The government experts released new an
Publish At:2020-02-15 17:31 | Read:75 | Comments:0 | Tags:APT Hacking Malware Reports CISA FBI information security ne

Sextortion Scams Delivered by Emotet Net 10 Times More Than Necurs Sextortion — Here’s Why

Recent spam campaigns from Emotet featured sextortion content very similar to emails previously sent by the Necurs botnet. However, Emotet spam ended up netting 10 times the amount that a comparable Necurs campaign did — within a matter of six hours. Why was Emotet so much more successful with the same type of ploy? Two factors played into this. First, Emote
Publish At:2020-02-15 17:18 | Read:54 | Comments:0 | Tags:Malware Threat Intelligence Banking Trojan Bitcoin Botnet Cy

Payment Card Data Security Incident Disclosed by Rutter’s

Convenience store and gas station chain Rutter’s disclosed a security incident that might have affected customers’ payment card data.According to a notice posted on its website, Rutter’s launched an investigation after receiving a report from a third-party of someone having gained unauthorized access to its customers’ payment cards da
Publish At:2020-02-15 17:09 | Read:25 | Comments:0 | Tags:IT Security and Data Protection Latest Security News malware

Over 70 Rutter's Stores Hit by Payment Card Breach

Convenience store and gas station chain Rutter’s informed customers this week that their payment card information may have been stolen by cybercriminals.Rutter’s has over 70 locations in Central Pennsylvania, West Virginia and Maryland, and a vast majority of them are affected. One of the impacted stores is in West Virginia and the other 70 are in Pennsylvan
Publish At:2020-02-15 16:11 | Read:98 | Comments:0 | Tags:NEWS & INDUSTRY Malware Cybercrime

USCYBERCOM Shares More North Korean Malware Samples

The U.S. Cyber Command (USCYBERCOM) has uploaded new malware samples to VirusTotal, all of which the Command has attributed to the North Korea-linked threat group Lazarus.The samples were added to the scanning engine as part of a project that USCYBERCOM’s Cyber National Mission Force (CNMF) that kicked off in November 2018. Previously released malicious file
Publish At:2020-02-15 16:11 | Read:86 | Comments:0 | Tags:NEWS & INDUSTRY Malware

LokiBot Impersonates Popular Game Launcher and Drops Compiled C# Code File

(By Augusto Remillano II, Mohammed Malubay, and Arvin Roi Macaraeg, Threat Analysts) LokiBot, which has the ability to harvest sensitive data such as passwords as well as cryptocurrency information, proves that the actors behind it is invested in evolving the threat. In the past, we have seen a campaign that exploits a remote code execution vulnerability to
Publish At:2020-02-15 13:05 | Read:140 | Comments:0 | Tags:Malware LokiBot

KBOT Malware Shows Viruses Are Not Extinct

KBOT, a piece of malware that has been infecting computers for the past year, has been classified by Kaspersky as a “living virus,” a class of malware thought to be extinct.Kaspersky discovered KBOT, which is also known as Kpot, in February 2019, and between March and December 2019 the company detected thousands of infections. A majority of infections were s
Publish At:2020-02-12 13:03 | Read:226 | Comments:0 | Tags:NEWS & INDUSTRY Virus & Threats Virus & Malware

Google Foiled Over 1.9B Malware Installs from Non-Play Sources in 2019

Google revealed that it blocked more than 1.9 billion installations of Android malware from non-Play Store sources over the course of 2019.On 11 February, Google revealed on the Android Developers Blog that it had succeeded in scanning billions of potential malware installations by creating a revamped Play Protect experience in 2019.This built-in malware pro
Publish At:2020-02-12 10:31 | Read:175 | Comments:0 | Tags:IT Security and Data Protection Latest Security News Android


Share high-quality web security related articles with you:)


Tag Cloud