HackDig : Dig high-quality web security articles for hacker

iTunes Zero-Day Vulnerability Exploited by BitPaymer Ransomware

The BitPaymer ransomware operators were observed abusing a zero-day vulnerability in Apple’s iTunes for Windows to run code and evade detection, Morphisec’s security researchers have discovered.The security flaw resides in the Bonjour updater that comes packaged with iTunes for Windows and allows attackers to abuse an unquoted path to not only evade detectio
Publish At:2019-10-11 00:05 | Read:93 | Comments:0 | Tags:Endpoint Security NEWS & INDUSTRY Virus & Threats Vi

iTunes Zero-Day Exploited to Deliver BitPaymer

The ransomware operators targeted an "unquoted path" vulnerability in iTunes for Windows to evade detection and install BitPaymer.Ransomware operators have been seen exploiting a zero-day vulnerability in iTunes for Windows to slip past security tools and infect victims with BitPaymer, researchers report.Back in August, the Morphisec team noticed attackers t
Publish At:2019-10-10 23:55 | Read:72 | Comments:0 | Tags: exploit

CVE-2019-16928: Exploiting an Exim Vulnerability via EHLO Strings

by Ashish Verma In September, security researchers from the QAX-A-Team discovered the existence of CVE-2019-16928, a vulnerability involving the mail transfer agent Exim. Exim accounts for over 50% of publicly reachable mail servers on the internet. What makes the bug particularly noteworthy is that threat actors could exploit it to perform denial of service
Publish At:2019-10-10 10:00 | Read:134 | Comments:0 | Tags:Vulnerabilities DevOps Vulnerability exploit

NSA: Multiple State-Sponsored APTs Exploiting Enterprise VPN Flaws

After the UK’s National Cyber Security Centre (NCSC) issued an alert, the National Security Agency (NSA) in the United States has also warned organizations that multiple state-sponsored threat actors have been exploiting the recently disclosed vulnerabilities affecting enterprise VPN products from Pulse Secure, Fortinet and Palo Alto Networks.According to th
Publish At:2019-10-09 12:00 | Read:198 | Comments:0 | Tags:Cyberwarfare NEWS & INDUSTRY Virus & Threats Vulnera

New Unpatchable iPhone Exploit Allows Jailbreaking

A new iOS exploit allows jailbreaking of pretty much all version of the iPhone. This is a huge deal for Apple, but at least it doesn't allow someone to remotely hack people's phones. Some details: I wanted to learn how Checkm8 will shape the iPhone experience­ -- particularly as it relates to security­ -- so I spoke at length with axi0mX on Friday. Thomas
Publish At:2019-10-08 09:50 | Read:246 | Comments:0 | Tags: exploit

APTs Exploiting Enterprise VPN Vulnerabilities, UK Govt Warns

Advanced persistent threat (APT) actors have been exploiting recently disclosed vulnerabilities affecting enterprise VPN products from Fortinet, Palo Alto Networks and Pulse Secure, the UK’s National Cyber Security Centre (NCSC) warns.The NCSC, which is part of the UK’s GCHQ intelligence agency, issued an alert this week to warn organizations that they may b
Publish At:2019-10-05 00:00 | Read:302 | Comments:0 | Tags:Cyberwarfare NEWS & INDUSTRY Virus & Threats Risk Ma

Android 0-Day Seen Exploited in the Wild

The local privilege escalation vulnerability affects Pixel, Samsung, Huawei, Xiaomi, and other devices.Researchers with Google's Project Zero have disclosed a zero-day local privilege escalation vulnerability in its Android mobile operating system that could let an attacker assume control of affected devices. Evidence shows the bug is being exploited in the
Publish At:2019-10-04 23:50 | Read:268 | Comments:0 | Tags: exploit

Zimperium Analysis of checkm8

Can you explain what checkm8 is?  On Friday, September 27th 2019, a security researcher known as @axi0mX publicly disclosed a vulnerability together with a working exploit called checkm8 (read “checkmate”). This permanent and unpatchable exploit leverages a vulnerability in Apple’s bootrom (read-only code; SecureROM), the initial and critical part in the se
Publish At:2019-10-03 17:30 | Read:217 | Comments:0 | Tags:Mobile Threat Defense advanced mobile threat defense Exploit

New iOS exploit checkm8 allows permanent compromise of iPhones

UPDATE 9/27, 11:00am: Updated for the misconception that the bootrom was actually being modified. Apparently, the “permanent” only refers to the fact that the bug is in the bootrom, where it cannot be patched. UPDATE 9/27, 12:15am: After speaking with @axi0m8, clarified a few other points, including the fact that this cannot be exploited remot
Publish At:2019-09-27 23:20 | Read:252 | Comments:0 | Tags:Mac Apple apple security apple vulnerability checkm8 exploit

'Unpatchable' iOS Bootrom Exploit Allows Jailbreaking of Many iPhones

A researcher specializing in iOS security claims to have created a bootrom exploit that can be leveraged to jailbreak hundreds of millions of iOS devices, including all iPhones between iPhone 4S and iPhone X.The hacker, who uses the online moniker axi0mX, has released the exploit for free in hopes that it would benefit security researchers and the iOS jailbr
Publish At:2019-09-27 12:00 | Read:250 | Comments:0 | Tags:Mobile Security NEWS & INDUSTRY Vulnerabilities Mobile &

How does the Ursnif Trojan variant exploit mouse movements?

As security researchers and vendors improve the security within their products, malicious actors are continually looking for ways to bypass them and continue their efforts. This cat and mouse game continues to play out, and is best seen in how malware authors are continually developing creative ways to create new attacks or workarounds. Many times, these tec
Publish At:2019-09-27 03:50 | Read:251 | Comments:0 | Tags: exploit

LDAP injection: How can it be exploited in an attack?

Joomla is a popular content management system that accounts for almost 3% of all websites on the internet, and it has been downloaded over 84 million times. A static analysis organization called Rips Technologies recently found it to be vulnerable to an LDAP injection vulnerability. This vulnerability was in the Joomla code for over eight years, and the comp
Publish At:2019-09-27 03:50 | Read:135 | Comments:0 | Tags: exploit

Mass Exploitation of vBulletin Flaw Raises Alarm

The remote code execution bug was a 0-day when it was publicly disclosed Monday, but has now been patched.Concerns are high over widespread attacks targeting a newly disclosed remotely exploitable vulnerability in the popular vBulletin online forum app even though a patch for the flaw is now available.The vulnerability—a zero-day threat when it was fir
Publish At:2019-09-26 23:50 | Read:115 | Comments:0 | Tags: exploit

vBulletin Patches Vulnerability Exploited in the Wild

Developers of the vBulletin forum software have rushed to release a patch for a recently disclosed remote command execution vulnerability, but the flaw has already been exploited in the wild, with some claiming that its existence has been known for years.An anonymous hacker published a proof-of-concept (PoC) exploit for the zero-day on the Full Disclosure ma
Publish At:2019-09-26 12:00 | Read:209 | Comments:0 | Tags:NEWS & INDUSTRY Virus & Threats Vulnerabilities Cybe

Hacker Releases Exploit for vBulletin Zero-Day Vulnerability

A hacker has released an exploit for an unpatched remote command execution vulnerability affecting the vBulletin forum software.A proof-of-concept (PoC) exploit for the zero-day was published on the Full Disclosure mailing list by an individual who wanted to remain anonymous. It’s unclear why they have decided to release the information before vBulletin deve
Publish At:2019-09-25 12:00 | Read:282 | Comments:0 | Tags:NEWS & INDUSTRY Virus & Threats Vulnerabilities Vuln


Share high-quality web security related articles with you:)


Tag Cloud