HackDig : Dig high-quality web security articles for hacker

UIWIX, the Fileless Ransomware that leverages NSA EternalBlue Exploit to spread

Security experts discovered a new ransomware family, dubbed UIWIX, that uses the NSA-linked EternalBlue exploit for distribution The effects of the militarization of the cyberspace are dangerous and unpredictable. A malicious code developed by a government could create serious problems for the Internet users, the recent WannaCry massive attack demonstrates i
Publish At:2017-05-20 05:35 | Read:2552 | Comments:0 | Tags:Breaking News Cyber Crime Malware Adylkuzz botnet Cybercrime

Some machines can’t be infected by WannaCry because they have been already infected by Adylkuzz

Security experts at ProofPoint security discovered that many machines can’t be infected by WannaCry because they have been already infected by Adylkuzz. The recent WannaCry ransomware attack wasn’t the first to use the NSA-linked EternalBlue and DoublePulsar hacking tools. Proofpoint researchers have discovered that the cryptocurrency miner Adylk
Publish At:2017-05-17 03:55 | Read:2142 | Comments:0 | Tags:Breaking News Cyber Crime Malware Adylkuzz botnet Cybercrime

Persirai: New Internet of Things (IoT) Botnet Targets IP Cameras

By Tim Yeh, Dove Chiu and Kenney Lu A new Internet of Things (IoT) botnet called Persirai (Detected by Trend Micro as ELF_PERSIRAI.A) has been discovered targeting over 1,000 Internet Protocol (IP) Camera models based on various Original Equipment Manufacturer (OEM) products. This development comes on the heels of Mirai—an open-source backdoor malware that c
Publish At:2017-05-13 14:15 | Read:1594 | Comments:0 | Tags:Internet of Things botnet IOT

Number of WordPress Attacks powered by compromised routers is rapidly dropping

Experts from security firm WordFence reported a rapid reduction of WordPress attacks originating from hundreds of ISPs worldwide. Experts at the security firm Wordfence a few weeks ago reported that tens of thousands of flawed routers from dozens of ISPs worldwide were recruited in a botnet used to power several types of attacks against WordPress websites. H
Publish At:2017-05-03 14:15 | Read:906 | Comments:0 | Tags:Breaking News Cyber Crime Hacking Internet of Things botnet

TrickBot is a rising threat, the banking Trojan now targets Private Banking

According to a new analysis conducted by the IBM’s X-Force security team, a new wave of attacks powered by the TrickBot banking Trojan have been targeting private banks in the UK, Australia, and Germany. The researchers observed new redirection attacks focused on new brands, including private banks, private wealth management firms, investment banking,
Publish At:2017-05-02 20:05 | Read:1066 | Comments:0 | Tags:Breaking News Cyber Crime Malware banking trojan botnet Cybe

Cybercrime – Interpol shutdown nearly 9,000 C&C servers in Asia hacked with a WordPress plug exploit

The Interpol located and shut down nearly 9,000 Command and control servers located in Asia and hacked with a WordPress plug-in exploit. An investigation conducted by the Interpol resulted in the identification of nearly 9,000 command and control servers located in Asia. The law enforcement body operated with the support of private partners, including Kasper
Publish At:2017-04-26 07:50 | Read:1460 | Comments:0 | Tags:Breaking News Cyber Crime Hacking botnet Cybercrime DDoS INT

Do you want your own IoT botnet? 185,000+ Wi-Fi-connected cameras are open to hack

The researcher Pierre Kim revealed that more than 185,000 vulnerable Wi-Fi-connected cameras are exposed to the Internet, ready to be hacked. According to the security advisory published by Pierre Kim via Full Disclosure, more than 185,000 vulnerable Wi-Fi-connected cameras are exposed to the Internet, a gift for crooks and hackers. The devices are affected
Publish At:2017-03-09 18:50 | Read:1514 | Comments:0 | Tags:Breaking News Hacking Internet of Things botnet IoT Wi-Fi-co

Dahua Video Recorders and Cameras affected by a serious flaw. Is it a backdoor?

The manufacture Dahua Technology has started releasing firmware updates fix a serious flaw in some models of its video recorders and IP cameras. Security experts believe the flaw is a true backdoor that could be used to remotely access the user database containing usernames and hashed passwords. The backdoor was discovered by a researcher that is known onlin
Publish At:2017-03-09 00:25 | Read:1609 | Comments:0 | Tags:Breaking News Cyber Crime Hacking Internet of Things Malware

The Necurs botnet is evolving, now includes a DDoS module

The Necurs botnet is evolving and recently the experts at BitSight’s Anubis Labs discovered that it was improved to launch DDoS attacks. The Necurs botnet continues to evolve and recently it was used by crooks not only to spread the dreaded Locky ransomware but he was improved to launch DDoS attacks. According to the researchers BitSight’s Anubis Labs who ar
Publish At:2017-02-28 06:45 | Read:1286 | Comments:0 | Tags:Breaking News Cyber Crime Malware botnet Cybercrime DDoS Hac

Kelihos becomes January’s Top 10 ‘Most Wanted’ Malware

The infamous Kelihos botnet climbed to the top position, while the Conficker worm dropped to fourth on the chart of malware. Which are the most active malware in the wild? According to a research conducted by CheckPoint Security, a malware landscape was characterized by some interesting changed in this first part of 2017. The Kelihos botnet climbed to the to
Publish At:2017-02-12 03:10 | Read:1680 | Comments:0 | Tags:Breaking News Cyber Crime Malware Reports botnet Cybercrime

Is IoT Security an Oxymoron?

Last year’s cyberattack against internet provider Dyn was something of a milestone. For the first time in a large-scale campaign, the attackers didn’t go directly at their target’s servers. Instead, they pressed Mirai malware into service. This malware automatically discovers Internet of Things (IoT) devices and leverages poor IoT security,
Publish At:2017-02-02 20:55 | Read:1264 | Comments:0 | Tags:Identity & Access Mobile Security Network & Endpoint Botnet

IoT Botnets Fueling Bigger and Badder DDoS Attacks, Finds Report

2017 promises to be the most challenging year yet for information security professionals. The security community will need to defend users and organizations against a host of new digital threats. In preparation for the year ahead, infosec experts should take a moment to reflect on the operational hurdles confronting them and the strategies they can use to ov
Publish At:2017-01-25 09:35 | Read:1530 | Comments:0 | Tags:Cyber Security Featured Articles botnet DDoS IoT DDOS

BankBot, an Android malware based on a source code leaked online

Antivirus firm Dr. Web spotted a new Android malware dubbed BankBot that is based on a source code that was leaked on an underground forum. Bad news for Android users, researchers from the Russian antivirus maker Dr. Web have reported that the source code for another Android banking malware has been leaked on an underground hacking forum. The leakage online
Publish At:2017-01-23 22:35 | Read:1324 | Comments:0 | Tags:Breaking News Cyber Crime Malware Android BankBot botnet Cyb

Necurs botnet is back and starts delivering the Locky ransomware

Cisco Security Team has noticed traces of traffic from the dormant Necurs botnet and they are warning of a possible new massive ransomware spam campaign. Security researchers at Cisco Security Team have noticed traces of traffic from the dormant Necurs botnet and they are warning of a possible new massive ransomware spam campaign. “The research from Ta
Publish At:2017-01-21 15:15 | Read:1891 | Comments:0 | Tags:Breaking News Cyber Crime Hacking botnet Locky malware Necur

The Three “M’s” of Mirai: Money, Multiplication, and Mitigation

21 October 2016 is a date that will live in infamy. At 11:10 UTC, internet performance management company Dyn began monitoring a distributed denial-of-service (DDoS) attack against its Domain Name System (DNS) infrastructure. It took Dyn approximately two hours to mitigate the attack. In that span of time, the DDoS campaign took down the websites for Twitter
Publish At:2016-12-30 18:15 | Read:1920 | Comments:0 | Tags:Featured Articles IT Security and Data Protection botnet DDo

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud