HackDig : Dig high-quality web security articles for hacker

More than a Dozen Obfuscated APT33 Botnets Used for Extreme Narrow Targeting

By Feike Hacquebord, Cedric Pernet, and Kenney Lu The threat group regularly referred to as APT33 is known to target the oil and aviation industries aggressively. This threat group has been reported on consistently for years, but our recent findings show that the group has been using about a dozen live Command and Control (C&C) servers for extremely narr
Publish At:2019-11-14 03:20 | Read:103 | Comments:0 | Tags:Botnets Targeted Attacks APT APT33 botnet phishing VPN

New Fileless Botnet Novter Distributed by KovCoreG Malvertising Campaign

By Jaromir Horejsi and Joseph C. Chen (Threat Researchers) We found a new modular fileless botnet malware, which we named “Novter,” (also reported and known as “Nodersok” and “Divergent”) that the KovCoreG campaign has been distributing since March. We’ve been actively monitoring this threat since its emergence and early development, and saw it being frequen
Publish At:2019-10-01 08:20 | Read:405 | Comments:0 | Tags:Bad Sites Botnets Malware botnet KovCoreG malvertising Nodst

Emotet malspam campaign uses Snowden’s new book as lure

Exactly one week ago, Emotet, one of the most dangerous threats to organizations in the last year, resumed its malicious spam campaigns after several months of inactivity. Based on our telemetry, we can see that the botnet started becoming chatty with its command and control servers (C2), about a week or so before the spam came through. Figure 1: Communic
Publish At:2019-09-23 23:25 | Read:397 | Comments:0 | Tags:Botnets botnet botnets Edward Snowden emotet macros malspam

Emotet is back: botnet springs back to life with new spam campaign

After a fairly long hiatus that lasted nearly four months, Emotet is back with an active spam distribution campaign. For a few weeks, there were signs that the botnet was setting its gears in motion again, as we observed command and control (C2) server activity. But this morning, the Trojan started pumping out spam, a clear indication it’s ready to jum
Publish At:2019-09-20 11:20 | Read:289 | Comments:0 | Tags:Botnets botnet botnets downloader emotet information stealer

One Third of The Internet Has Seen a DDoS Attack In The Past Two Years

A group of researchers has conducted a rigorous comprehensive characterization of this DDoS attacks and of countermeasures to mitigate the associated risks. Denial of Service (DoS) attacks have been around about as long as computers have been network connected. A website’s purpose is to accept connections from the Internet and return information. A bad
Publish At:2017-11-07 05:10 | Read:16175 | Comments:0 | Tags:Breaking News Cyber Crime Hacking Reports botnet DDoS attack

Exclusive – CSE ZLab experts spotted a new Wonder botnet in the wild

The CSE CybSec Z-Lab Malware Lab spotted a new botnet, dubbed Wonder botnet, while it was investigating malicious code in the dark web. While investigating the malicious code in the dark web, ZLab experts discovered a “NetflixAccountGenerator.exe” that promises to generate a premium account for Netflix services for free. Unfortunately, the software downloade
Publish At:2017-10-23 18:55 | Read:3863 | Comments:0 | Tags:Breaking News Deep Web Hacking Malware Reports botnet CSE ma

Necurs botnet now spreading the Locky Ransomware via DDE Attacks

Operators behind Locky ransomware campaigns have switched to new attack techniques to evade detection leveraging the DDE protocol. Security experts are continuing to observe the Locky ransomware spreading via spam campaigns that rely on the Necurs botnet. Now operators behind Locky ransomware campaigns have switched to new attack techniques to evade detectio
Publish At:2017-10-22 06:05 | Read:2516 | Comments:0 | Tags:Breaking News Malware botnet DDE attack Hacking Locky Ransom

Experts discovered a SYSCON Backdoor using FTP Server as C&C

Security researchers with Trend Micro discovered a backdoor dubbed SYSCON that uses an FTP server for command and control (C&C) purposes. The SYSCON backdoor is spreading through tainted documents that refer North Korea and target individuals connected to the Red Cross and the World Health Organization. The use of an FTP server as C&C is uncommon fo
Publish At:2017-10-05 17:05 | Read:4932 | Comments:0 | Tags:Breaking News Cyber Crime Hacking Malware backdoor botnet Cy

Imperva Report Q2 2017- Over 75% of DDoS targets were hit multiple times

According to Imperva DDoS report, over 75% of targets were hit multiple times in Q2 2017, while the percentage was only 43.2% in the same period of 2016. Imperva published the Global DDoS Threat Landscape for Q2 2017, the report shows an increase in the amount of persistent application layer DDoS attack over a one-year period. According to Imperva, over 75%
Publish At:2017-10-03 09:45 | Read:3410 | Comments:0 | Tags:Breaking News Hacking Reports botnet Cybercrime DDoS Q2 2017

Crooks hacked Microsoft servers to mine Monero, they earned $63K in 3 months

Experts from security firm ESET discovered cyber criminals exploiting Microsoft Servers to mine Monero and already earned $63,000 in 3 Months. Mining cryptocurrencies is a profitable business, but it is also expensive because it needs significant investment in computing power. Crooks are using malicious code that steals computing resources of victims’
Publish At:2017-09-29 12:55 | Read:3139 | Comments:0 | Tags:Breaking News Cyber Crime Hacking botnet crypto currency Mic

EMOTET Returns, Starts Spreading via Spam Botnet

We first detected the banking malware EMOTET back in 2014, we looked into the banking malware’s routines and behaviors and took note of its information stealing abilities via network sniffing. After a period of relative inactivity, it appears it’s making a comeback with increased activity from new variants (Detected by Trend Micro as TSPY_EMOTET.AUSJLA
Publish At:2017-09-07 22:45 | Read:4024 | Comments:0 | Tags:Botnets Malware botnet EMOTET Trojan

Google removed almost 300 Android apps involved in DDoS attack

Google removed almost 300 Android apps from the official Play Store after expert at ESET reported they were abused for a DDoS attack. This week Google has removed at least 300 apps from the Official Play Store after learning that apps were being hijacked to power DDoS attacks. “We identified approximately 300 apps associated with the issue, blocked them from
Publish At:2017-09-03 18:25 | Read:2675 | Comments:0 | Tags:Breaking News Hacking Malware Mobile Android botnet DDoS Ese

Vxer is offering Cobian RAT in the underground, but it is backdoored

Malware writer is offering for free a malware dubbed Cobian RAT in the underground, but the malicious code hides an ugly surprise. In the dark web, it is quite easy to find alone vxers and hacking forums that offer malware and customize them according to buyers’ needs. Recently researchers from Zscaler have spotted a remote access trojan dubbed Cobian
Publish At:2017-09-01 11:06 | Read:4214 | Comments:0 | Tags:Breaking News Cyber Crime Malware botnet Cobian RAT Cybercri

More than 1,700 valid Telnet credentials for IoT devices leaked online

Security researchers are warning of the availability online of a list of IoT devices and associated telnet credentials. The list has been available on Pastebin since June, but last week it was also shared via Twitter by the researcher Ankit Anubhav becoming rapidly viral. The original list was posted by someone who has previously published a dump of valid lo
Publish At:2017-08-27 01:10 | Read:4302 | Comments:0 | Tags:Breaking News Hacking Internet of Things botnet data leak Io

Roughly 175,000 Chinese Internet Connected security cameras can be easily hacked

An estimated 175,000 Internet of Things (IoT) connected security cameras manufactured by Shenzhen Neo Electronics are vulnerable to cyber attacks. According to a new report from security provider Bitdefender, roughly 175,000 connected security cameras are vulnerable to cyber attacks. The vulnerable cameras are manufactured by the Chinese company Shenzhen Neo
Publish At:2017-08-02 13:35 | Read:4483 | Comments:0 | Tags:Breaking News Hacking Internet of Things botnet Cybercrime I

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud