HackDig : Dig high-quality web security articles for hacker

Locky ransomware strikes at Amazon

Locky is back! We’ve been closely monitoring the rebirth of the ransomware for quite some time. Since early last year, different variations of the ransomware have been periodically popping in and out. Last year we discussed the tricks of the malicious software and had a deeper look into how it works. As you may remember, the primary purpose of the malicious
Publish At:2017-09-22 06:05 | Read:102 | Comments:0 | Tags:Malware Mobile News cybersecurity Ransomware

ISPs in at least two countries were involved in delivering surveillance FinFisher Spyware

Security researchers at ESET have uncovered a surveillance campaign using a new variant of FinFisher spyware, also known as FinSpy. Finfisher infected victims in seven countries and experts believe that in two of them the major internet providers have been involved. “New surveillance campaigns utilizing FinFisher, infamous spyware known also as FinSpy
Publish At:2017-09-21 20:20 | Read:53 | Comments:0 | Tags:Breaking News Cyber Crime Cyber warfare Hacking Intelligence

FedEx announces $300m in lost business and response costs after NotPetya attack

FedEx is the last firm in order of time that disclosed the cost caused by the massive NotPetya, roughly $300m in lost business and response costs. The malware compromised systems worldwide, most of them in Ukraine, the list of victims is long and includes the US pharmaceutical company Merck, the shipping giant Maersk, the Ukraine’s central bank, Russian oil
Publish At:2017-09-21 01:55 | Read:128 | Comments:0 | Tags:Breaking News Cyber Crime Malware FedEx malware notpetya ran

New RETADUP Variants Hit South America, Turn To Cryptocurrency Mining

By Lenart Bermejo, Kenney Lu, and Cedric Pernet Several months ago, we discovered and exposed RETADUP malware in Israeli hospitals. We also learned that an Android malware known as “GhostCtrl” was stored in their infrastructure, which might be used for cyberespionage or cybercrime. Since then, we’ve encountered more samples in the wild. While RETADUP w
Publish At:2017-09-20 13:55 | Read:88 | Comments:0 | Tags:Malware cryptocurrency miner Monero RETADUP South America

New Android Banking Trojan Red Alert 2.0 available for sale on crime forums

Researchers discovered a new Android banking Trojan, dubbed Red Alert 2.0, that is being offered for rent on many dark websites for $500 per month. Researchers with security firm SfyLabs have discovered a new Android banking Trojan, dubbed Red Alert 2.0, that is being offered for rent on many dark websites for $500 per month. “The last several months a
Publish At:2017-09-19 13:05 | Read:144 | Comments:0 | Tags:Breaking News Cyber Crime Deep Web Malware Android banking t

Network Attacks Containing Cryptocurrency CPU Mining Tools Grow Sixfold

Since we last reported on a version of the ELF Linux/Mirai malware containing cryptocurrency coin-mining tools in April, the IBM X-Force has noticed a steep increase in the volume of coin central processing unit (CPU) mining tools used in cyberattacks, specifically those targeting enterprise networks. According to IBM Managed Security Services (MSS) data,
Publish At:2017-09-19 12:00 | Read:61 | Comments:0 | Tags:Advanced Threats Security Services Threat Intelligence X-For

Malware attacks leverage the Hangul Word Processor and PostScript to spread malware

Experts at Trend Micro reported malware attacks that leveraged the Hangul Word Processor (HWP) word processing application to target users. It has happened again, attackers leveraged the Hangul Word Processor (HWP) word processing application to target users in South Korea. The application is very popular in South Korea and was exploited in several hacking c
Publish At:2017-09-18 18:30 | Read:149 | Comments:0 | Tags:Breaking News Hacking Malware Hangul PostScript South Korea

CSE CybSec ZLAB Malware Analysis Report: NotPetya

I’m proud to share with you the first report produced by Z-Lab, the Malware Lab launched by the company CSE CybSec. Enjoy the Analysis Report NotPetya. As most of you already know I have officially presented my new Co a couple of months ago, CybSec Enterprise is its name and we already started to work on strategic projects that we will reveal soon R
Publish At:2017-09-18 18:30 | Read:133 | Comments:0 | Tags:Breaking News Malware Reports malware Malware Analysis notpe

CCleaner supply chain compromised to distribute malware

CCleaner app version 5.33 that was available for download between August 15 and September 12 was modified to include the Floxif malware Bad news for the users of the CCleaner app, according to researchers with Cisco Talos, version 5.33 that was available for download between August 15 and September 12 was modified to include the Floxif malware. The Floxif m
Publish At:2017-09-18 18:30 | Read:113 | Comments:0 | Tags:Breaking News Cyber Crime Hacking Malware CCleaner CCleaner

[SANS ISC] Getting some intelligence from malspam

I published the following diary on isc.sans.org: “Getting some intelligence from malspam“. Many of us are receiving a lot of malspam every day. By “malspam”, I mean spam messages that contain a malicious document. This is one of the classic infection vectors today and aggressive campaigns are started every week. Usually, most of them
Publish At:2017-09-18 08:05 | Read:64 | Comments:0 | Tags:Malware Security Splunk Intelligence SANS ISC

Premium SMS malware EXPENSIVEWALL infected millions of Android handsets

Google removed 50 malicious apps from the official Play Store after experts discovered a new malware, dubbed ExpensiveWall, eluded Google Bouncer checks. Google has removed 50 malicious apps from the official Play Store after experts with security firm Check Point discovered a new malware, dubbed ExpensiveWall,  eluded the checks of the Google’s Bounce
Publish At:2017-09-15 16:40 | Read:207 | Comments:0 | Tags:Breaking News Cyber Crime Malware Mobile Android ExpensiveWa

BlueBorne Bluetooth hack could affect millions of smartphones

Bluetooth is an important smartphone technology, allowing us to transfer files, or to listen to music, wirelessly. It’s so useful that many people leave it switched on all the time. But researchers have discovered a vulnerability in the technology that allows hackers to take control of a victim’s phone remotely. Known as “BlueBorne”, the technique can be use
Publish At:2017-09-15 08:00 | Read:183 | Comments:0 | Tags:Mobile News Mobile Security Android Hackers Malware

Thousands of Elasticsearch installs compromised to host PoS Malware

Experts discovered 4,000 compromised installations on Amazon AWS of open source analytics and search tool Elasticsearch that were running PoS malware. Security researchers from the firm Kromtech have discovered 4,000 compromised instances of open source analytics and search tool Elasticsearch that were running PoS malware. According to Kromtech, this is just
Publish At:2017-09-14 22:15 | Read:145 | Comments:0 | Tags:Breaking News Cyber Crime Hacking Cybercrime Elasticsearch m

Downward Trend in Publicly Available Exploit Code? Don’t Ease Up on Patch Management Just Yet

The IBM X-Force Vulnerability Database (XFDB), which holds over 100,000 publicly disclosed vulnerabilities, is chock-full of insights concerning the cybersecurity threat landscape. Much of the data is publicly available directly on the IBM X-Force Exchange platform and can be accessed by users anytime. In reviewing the database on an ongoing basis, the IBM
Publish At:2017-09-14 21:10 | Read:185 | Comments:0 | Tags:Advanced Threats Endpoint Threat Intelligence X-Force Resear

Hangul Word Processor and PostScript Abused Via Malicious Attachments

The Hangul Word Processor (HWP) is a word processing application which is fairly popular in South Korea. It possesses the ability to run PostScript code, which is a language originally used for printing and desktop publishing, although it is a fully capable language. Unfortunately, this ability is now being exploited in attacks involving malicious attachment
Publish At:2017-09-14 10:15 | Read:122 | Comments:0 | Tags:Malware Vulnerabilities Encapsulated PostScript Hangul Word

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud