HackDig : Dig high-quality web security articles for hacker

TrickBot gang is back with new campaigns targeting Payment Processors and CRM Providers

Threat actors behind the financial trojan TrickBot have been updating its campaigns targeting Payment Processors and CRM Providers. Threat actors behind Banking Trojan TrickBot switched from financial institutions to Payment processors and CRM providers. TrickBot was initially observed in September 2016 by the researchers at security firm Fidelis Cybersecuri
Publish At:2017-06-20 23:50 | Read:124 | Comments:0 | Tags:Breaking News Cyber Crime Malware banking trojan botnet CRM

Pinkslipbot banking Trojan exploiting infected machines as control servers

Pinkslipbot banking Trojan is a banking Trojan that uses a complicated multistage proxy for HTTPS-based control server communication. Security researchers at McAfee Labs have spotted a new strain of the Pinkslipbot banking malware (also known as QakBot/QBot) that leverages UPnP to open ports, allowing incoming connections from anyone on the Internet to commu
Publish At:2017-06-19 11:00 | Read:199 | Comments:0 | Tags:Breaking News Cyber Crime Malware Banking Malware botnet Cyb

Rapid7 report millions of endpoints exposed via SMB, Telnet Ports

A study conducted by the security firm Rapid7 revealed that millions of devices remain exposed to cyber attacks via  SMB, Telnet, RDP, and other types of improper configurations. Rapid7 published the second report National Exposure Index that provides Internet service providers (ISPs) worldwide information about the global exposure of devices. The researche
Publish At:2017-06-16 09:20 | Read:202 | Comments:0 | Tags:Breaking News Hacking Internet of Things Reports botnet Inte

UIWIX, the Fileless Ransomware that leverages NSA EternalBlue Exploit to spread

Security experts discovered a new ransomware family, dubbed UIWIX, that uses the NSA-linked EternalBlue exploit for distribution The effects of the militarization of the cyberspace are dangerous and unpredictable. A malicious code developed by a government could create serious problems for the Internet users, the recent WannaCry massive attack demonstrates i
Publish At:2017-05-20 05:35 | Read:466 | Comments:0 | Tags:Breaking News Cyber Crime Malware Adylkuzz botnet Cybercrime

Some machines can’t be infected by WannaCry because they have been already infected by Adylkuzz

Security experts at ProofPoint security discovered that many machines can’t be infected by WannaCry because they have been already infected by Adylkuzz. The recent WannaCry ransomware attack wasn’t the first to use the NSA-linked EternalBlue and DoublePulsar hacking tools. Proofpoint researchers have discovered that the cryptocurrency miner Adylk
Publish At:2017-05-17 03:55 | Read:380 | Comments:0 | Tags:Breaking News Cyber Crime Malware Adylkuzz botnet Cybercrime

Persirai: New Internet of Things (IoT) Botnet Targets IP Cameras

By Tim Yeh, Dove Chiu and Kenney Lu A new Internet of Things (IoT) botnet called Persirai (Detected by Trend Micro as ELF_PERSIRAI.A) has been discovered targeting over 1,000 Internet Protocol (IP) Camera models based on various Original Equipment Manufacturer (OEM) products. This development comes on the heels of Mirai—an open-source backdoor malware that c
Publish At:2017-05-13 14:15 | Read:274 | Comments:0 | Tags:Internet of Things botnet IOT

Number of WordPress Attacks powered by compromised routers is rapidly dropping

Experts from security firm WordFence reported a rapid reduction of WordPress attacks originating from hundreds of ISPs worldwide. Experts at the security firm Wordfence a few weeks ago reported that tens of thousands of flawed routers from dozens of ISPs worldwide were recruited in a botnet used to power several types of attacks against WordPress websites. H
Publish At:2017-05-03 14:15 | Read:324 | Comments:0 | Tags:Breaking News Cyber Crime Hacking Internet of Things botnet

TrickBot is a rising threat, the banking Trojan now targets Private Banking

According to a new analysis conducted by the IBM’s X-Force security team, a new wave of attacks powered by the TrickBot banking Trojan have been targeting private banks in the UK, Australia, and Germany. The researchers observed new redirection attacks focused on new brands, including private banks, private wealth management firms, investment banking,
Publish At:2017-05-02 20:05 | Read:384 | Comments:0 | Tags:Breaking News Cyber Crime Malware banking trojan botnet Cybe

Cybercrime – Interpol shutdown nearly 9,000 C&C servers in Asia hacked with a WordPress plug exploit

The Interpol located and shut down nearly 9,000 Command and control servers located in Asia and hacked with a WordPress plug-in exploit. An investigation conducted by the Interpol resulted in the identification of nearly 9,000 command and control servers located in Asia. The law enforcement body operated with the support of private partners, including Kasper
Publish At:2017-04-26 07:50 | Read:421 | Comments:0 | Tags:Breaking News Cyber Crime Hacking botnet Cybercrime DDoS INT

Do you want your own IoT botnet? 185,000+ Wi-Fi-connected cameras are open to hack

The researcher Pierre Kim revealed that more than 185,000 vulnerable Wi-Fi-connected cameras are exposed to the Internet, ready to be hacked. According to the security advisory published by Pierre Kim via Full Disclosure, more than 185,000 vulnerable Wi-Fi-connected cameras are exposed to the Internet, a gift for crooks and hackers. The devices are affected
Publish At:2017-03-09 18:50 | Read:610 | Comments:0 | Tags:Breaking News Hacking Internet of Things botnet IoT Wi-Fi-co

Dahua Video Recorders and Cameras affected by a serious flaw. Is it a backdoor?

The manufacture Dahua Technology has started releasing firmware updates fix a serious flaw in some models of its video recorders and IP cameras. Security experts believe the flaw is a true backdoor that could be used to remotely access the user database containing usernames and hashed passwords. The backdoor was discovered by a researcher that is known onlin
Publish At:2017-03-09 00:25 | Read:487 | Comments:0 | Tags:Breaking News Cyber Crime Hacking Internet of Things Malware

The Necurs botnet is evolving, now includes a DDoS module

The Necurs botnet is evolving and recently the experts at BitSight’s Anubis Labs discovered that it was improved to launch DDoS attacks. The Necurs botnet continues to evolve and recently it was used by crooks not only to spread the dreaded Locky ransomware but he was improved to launch DDoS attacks. According to the researchers BitSight’s Anubis Labs who ar
Publish At:2017-02-28 06:45 | Read:555 | Comments:0 | Tags:Breaking News Cyber Crime Malware botnet Cybercrime DDoS Hac

Kelihos becomes January’s Top 10 ‘Most Wanted’ Malware

The infamous Kelihos botnet climbed to the top position, while the Conficker worm dropped to fourth on the chart of malware. Which are the most active malware in the wild? According to a research conducted by CheckPoint Security, a malware landscape was characterized by some interesting changed in this first part of 2017. The Kelihos botnet climbed to the to
Publish At:2017-02-12 03:10 | Read:579 | Comments:0 | Tags:Breaking News Cyber Crime Malware Reports botnet Cybercrime

Is IoT Security an Oxymoron?

Last year’s cyberattack against internet provider Dyn was something of a milestone. For the first time in a large-scale campaign, the attackers didn’t go directly at their target’s servers. Instead, they pressed Mirai malware into service. This malware automatically discovers Internet of Things (IoT) devices and leverages poor IoT security,
Publish At:2017-02-02 20:55 | Read:571 | Comments:0 | Tags:Identity & Access Mobile Security Network & Endpoint Botnet

IoT Botnets Fueling Bigger and Badder DDoS Attacks, Finds Report

2017 promises to be the most challenging year yet for information security professionals. The security community will need to defend users and organizations against a host of new digital threats. In preparation for the year ahead, infosec experts should take a moment to reflect on the operational hurdles confronting them and the strategies they can use to ov
Publish At:2017-01-25 09:35 | Read:591 | Comments:0 | Tags:Cyber Security Featured Articles botnet DDoS IoT DDOS

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud