HackDig : Dig high-quality web security articles for hackers

Backdoor, Devil Shadow Botnet Hidden in Fake Zoom Installers

By Raphael Centeno and Llallum Victoria With additional insights from Bren Matthew Ebriega Cybercriminals are taking advantage of “the new normal” — involving employees’ remote working conditions and the popularity of user-friendly online tools — by abusing and spoofing popular legitimate applications to infect systems with malicious routines. We found two m
Publish At:2020-05-24 07:47 | Read:142 | Comments:0 | Tags:Bad Sites Botnets Malware application backdoor botnet Devil

Shining a light on “Silent Night” Zloader/Zbot

When it comes to banking Trojans, ZeuS is probably the most famous one ever released. Since its source code originally leaked in 2011, several new variants proliferated online. That includes a past fork called Terdot Zbot/Zloader, which we extensively covered in 2017. But recently, we observed another bot, with a design reminiscent of ZeuS, that seems to
Publish At:2020-05-24 07:20 | Read:77 | Comments:0 | Tags:Malware Threat analysis banking Trojan banking Trojans HYAS

Refocusing Cybersecurity Best Practices on Security Hygiene

While organizations around the world are rightly focused on the COVID-19 pandemic, the work of cybersecurity must continue. In fact, attackers often increase their efforts to breach networks and systems during times of trouble, counting on the chaos as a useful distraction. In such times, the best cybersecurity practices should actually refocus on the most b
Publish At:2020-05-24 06:18 | Read:109 | Comments:0 | Tags:CISO Antivirus Chief Information Security Officer (CISO) Cyb

[SANS ISC] AgentTesla Delivered via a Malicious PowerPoint Add-In

I published the following diary on isc.sans.edu: “AgentTesla Delivered via a Malicious PowerPoint Add-In“: Attackers are always trying to find new ways to deliver malicious code to their victims. Microsoft Word and Excel are documents that can be easily weaponized by adding malicious VBA macros. Today, they are one of the most common technique
Publish At:2020-05-24 06:01 | Read:78 | Comments:0 | Tags:Malware SANS Internet Storm Center Security AgentTesla Power

'Ramsay' Espionage Framework Can Exfiltrate Data From Air-Gapped Networks

A recently identified cyber-espionage framework is capable of collecting and exfiltrating sensitive information even from air-gapped networks, ESET reports.Dubbed Ramsay, the framework appears to be in the development stage, with its operators still working on refining delivery vectors. Visibility of victims is low, either because the framework hasn’t enjoye
Publish At:2020-05-18 13:56 | Read:241 | Comments:0 | Tags:Cyberwarfare NEWS & INDUSTRY Virus & Threats Virus &

Chinese Hackers Target Air-Gapped Military Networks

A threat actor believed to be operating out of China has been targeting physically isolated military networks in Taiwan and the Philippines, Trend Micro reports.Tracked as Tropic Trooper and KeyBoy, and active since at least 2011, the threat actor is known for the targeting of government, military, healthcare, transportation, and high-tech industries in Taiw
Publish At:2020-05-18 13:55 | Read:186 | Comments:0 | Tags:Cyberwarfare Endpoint Security NEWS & INDUSTRY Virus &am

NortonLifeLock Releases Free Tool for Detecting Bots on Twitter

NortonLifeLock this week released the beta version of a free browser extension that allows Twitter users to easily identify bots on the social media platform.The tool, named BotSight, is currently available for Chrome, Chromium-based Brave, and Firefox for users in the US, UK, Australia and New Zealand. Its developers also plan on creating a smartphone
Publish At:2020-05-18 13:55 | Read:209 | Comments:0 | Tags:NEWS & INDUSTRY Virus & Threats Fraud & Identity

'Mandrake' Android Spyware Remained Undetected for 4 Years

Security researchers at Bitdefender have identified a highly sophisticated Android spyware platform that managed to remain undetected for four years.Dubbed Mandrake, the platform targets only specific devices, as its operators are keen on remaining undetected for as long as possible. Thus, the malware avoids infecting devices in countries that might bring no
Publish At:2020-05-18 13:54 | Read:206 | Comments:0 | Tags:Mobile Security NEWS & INDUSTRY Virus & Threats Malw

Crypto-Mining Campaign Hits European Supercomputers

Several supercomputers across Europe were taken offline last week after being targeted in what appears to be a crypto-mining campaign.In a notice on Saturday, the Swiss National Supercomputing Centre (CSCS) revealed that it too has been hit, along with other “HPC [High Performance Computing] and academic data centres of Europe and around the world.”CSCS said
Publish At:2020-05-18 13:54 | Read:191 | Comments:0 | Tags:NEWS & INDUSTRY Virus & Threats Malware Cybercrime

Transportation Agency Hacked in 2nd Texas Government Attack

Texas’ transportation agency has become the second part of the state government to be hit by a ransomware attack in recent days.On Thursday, someone hacked into the Texas Department of Transportation’s network in a “ransomware event,” according to a statement the department posted on social media Friday.The departments’ website says some features are unavail
Publish At:2020-05-18 13:53 | Read:249 | Comments:0 | Tags:NEWS & INDUSTRY Virus & Threats Virus & Malware

Australian Steel Maker BlueScope Hit by Cyberattack

Australian steel producer BlueScope was recently hit by a cyberattack that caused disruptions to some of the company’s operations.The company said on Friday that it responded to a “cyber incident” detected at one of its US-based businesses. While BlueScope did not share any information about the type of attack, iTnews reported that the company was hit by ran
Publish At:2020-05-18 13:53 | Read:183 | Comments:0 | Tags:NEWS & INDUSTRY Virus & Threats Virus & Malware

New Mac variant of Lazarus Dacls RAT distributed via Trojanized 2FA app

This blog post was authored by Hossein Jazi, Thomas Reed and Jérôme Segura. We recently identified what we believe is a new variant of the Dacls Remote Access Trojan (RAT) associated with North Korea’s Lazarus group, designed specifically for the Mac operating system. Dacls is a RAT that was discovered by Qihoo 360 NetLab in December 2019 as a fu
Publish At:2020-05-18 13:43 | Read:168 | Comments:0 | Tags:Mac Malware Threat analysis APT Dacls Lazarus mac malware ra

Lock and Code S1Ep6: Recognizing facial recognition’s flaws with Chris Boyd

This week on Lock and Code, we discuss the top security headlines generated right here on Labs and around the Internet. In addition, we talk to Chris Boyd, lead malware intelligence analyst at Malwarebytes, about facial recognition technology—its early history, its proven failures at accuracy, and whether improving the technology would actually be ̶
Publish At:2020-05-18 13:42 | Read:74 | Comments:0 | Tags:A week in security Podcast esports facial recognition lock a

Sodinokibi drops greatest hits collection, and crime is the secret ingredient

When a group of celebrities ask to speak with their lawyer, they usually don’t have to call in a bunch of other people to go speak with their lawyer. However, in this case it may well be a thing a little down the line. A huge array of musicians including Bruce Springsteen, Lady Gaga, Madonna, Run DMC and many more have had documents galore pilfered by the So
Publish At:2020-05-18 13:42 | Read:151 | Comments:0 | Tags:Cybercrime Hacking lady gaga legal madonna malware music ran

Key Moments in the History of Mac Malware – 1982 to the Present

You’ve certainly heard people say that "Macs don’t get viruses." And, while that’s generally true – most malware these days isn’t viruses but other types of malicious software – the Mac has a long history of malware attacks. Viruses, worms, Trojan horses; the Mac has seen them all. Here is an overview of the hist
Publish At:2020-05-18 13:21 | Read:130 | Comments:0 | Tags:Malware


Share high-quality web security related articles with you:)


Tag Cloud