HackDig : Dig high-quality web security articles

Exploitation of the CVE-2021-40444 vulnerability in MSHTML

Summary Last week, Microsoft reported the remote code execution vulnerability CVE-2021-40444 in the MSHTML browser engine. According to the company, this vulnerability has already been used in targeted attacks against Microsoft Office users. In attempt to exploit this vulnerability, attackers create a document with a specially-crafted object. If a user opens
Publish At:2021-09-17 08:37 | Read:532 | Comments:0 | Tags:Incidents Malware Descriptions Microsoft Microsoft Internet

Triada Trojan in WhatsApp MOD

WhatsApp users sometimes feel the official app is lacking a useful feature of one sort or another, be it animated themes, self-destructing messages which automatically delete themselves, the option of hiding certain conversations from the main list, automatic translation of messages, or the option of viewing messages that have been deleted by the sender. Thi
Publish At:2021-08-24 08:05 | Read:44 | Comments:0 | Tags:Incidents Malware descriptions Google Android Instant Messen

Arrests of members of Tetrade seed groups Grandoreiro and Melcoz

Spain’s Ministry of the Interior has announced the arrest of 16 individuals connected to the Grandoreiro and Melcoz (also known as Mekotio) cybercrime groups. Both are originally from Brazil and form part of the Tetrade umbrella, operating for a few years now in Latin America and Western Europe. Grandoreiro is a banking Trojan malware family that initi
Publish At:2021-07-14 15:34 | Read:392 | Comments:0 | Tags:Incidents Brazil Cybercrime Financial malware Law Enforcemen

Quick look at CVE-2021-1675 & CVE-2021-34527 (aka PrintNightmare)

Summary Last week Microsoft warned Windows users about vulnerabilities in the Windows Print Spooler service – CVE-2021-1675 and CVE-2021-34527 (also known as PrintNightmare). Both vulnerabilities can be used by an attacker with a regular user account to take control of a vulnerable server or client machine that runs the Windows Print Spooler service. This se
Publish At:2021-07-08 01:25 | Read:606 | Comments:0 | Tags:Incidents Malware Descriptions Microsoft Windows Security te

REvil ransomware attack against MSPs and its clients around the world

An attack perpetrated by REvil aka Sodinokibi ransomware gang against Managed Service Providers (MSPs) and their clients was discovered on July 2. Some of the victims have reportedly been compromised through a popular MSP software which led to encryption of their customers. The total number of encrypted businesses could run into thousands. REvil ransomware h
Publish At:2021-07-05 11:21 | Read:1138 | Comments:0 | Tags:Incidents Research Cybercrime RaaS Ransomware Supply-chain a

Malicious code in APKPure app

Recently, we’ve found malicious code in version 3.17.18 of the official client of the APKPure app store. The app is not on Google Play, but it is itself a quite a popular app store around the world. Most likely, its infection is a repeat of the CamScanner incident, when the developer implemented a new adware SDK from an unverified source. We notified t
Publish At:2021-04-09 13:17 | Read:898 | Comments:0 | Tags:Incidents Code injection Google Android Malware Technologies

Zero-day vulnerabilities in Microsoft Exchange Server

What happened? On March 2, 2021 several companies released reports about in-the-wild exploitation of zero-day vulnerabilities inside Microsoft Exchange Server. The following vulnerabilities allow an attacker to compromise a vulnerable Microsoft Exchange Server. As a result, an attacker will gain access to all registered email accounts, or be able to execute
Publish At:2021-03-04 13:55 | Read:1082 | Comments:0 | Tags:Incidents Malware Microsoft Ransomware Vulnerabilities and e

Sunburst: connecting the dots in the DNS requests

On December 13, 2020 FireEye published important details of a newly discovered supply chain attack. An unknown attacker, referred to as UNC2452 or DarkHalo planted a backdoor in the SolarWinds Orion IT software. This backdoor, which comes in the form of a .NET module, has some really interesting and rather unique features. We spent the past days checking our
Publish At:2020-12-18 10:00 | Read:1210 | Comments:0 | Tags:APT reports Incidents Backdoor Malware Descriptions Malware

Mokes and Buerak distributed under the guise of security certificates

The technique of distributing malware under the guise of legitimate software updates is not new. As a rule, cybercriminals invite potential victims to install a new version of a browser or Adobe Flash Player. However, we recently discovered a new approach to this well-known method: visitors to infected sites were informed that some kind of security certifica
Publish At:2020-03-05 08:33 | Read:2190 | Comments:0 | Tags:Featured Incidents Backdoor Digital Certificates Trojan Vuln

AZORult spreads as a fake ProtonVPN installer

AZORult has its history. However, a few days ago, we discovered what appears to be one of its most unusual campaigns: abusing the ProtonVPN service and dropping malware via fake ProtonVPN installers for Windows. Screenshot of a fake ProtonVPN website The campaign started at the end of November 2019 when the threat actor behind it registered a new domain und
Publish At:2020-02-18 06:35 | Read:2416 | Comments:0 | Tags:Featured Incidents Botnets Cryptocurrencies Data theft Malve

Chrome 0-day exploit CVE-2019-13720 used in Operation WizardOpium

Executive summary Kaspersky Exploit Prevention is a component part of Kaspersky products that has successfully detected a number of zero-day attacks in the past. Recently, it caught a new unknown exploit for Google’s Chrome browser. We promptly reported this to the Google Chrome security team. After reviewing of the PoC we provided, Google confirmed th
Publish At:2019-11-12 01:05 | Read:3224 | Comments:0 | Tags:Featured Incidents Google Chrome JavaScript Proof-of-Concept

An advertising dropper in Google Play

Recently, the popular CamScanner – Phone PDF creator app caught our attention. According to Google Play, it has been installed more than 100 million times. The developers position it as a solution for scanning and managing digitized documents, but negative user reviews that have been left over the past month have indicated the presence of unwanted features.
Publish At:2019-09-19 18:20 | Read:2251 | Comments:0 | Tags:Featured Incidents Adware Google Android Mobile Malware Troj

Bad Rabbit ransomware

What happened? On October 24th we observed notifications of mass attacks with ransomware called Bad Rabbit. It has been targeting organizations and consumers, mostly in Russia but there have also been reports of victims in Ukraine. Here’s what a ransom message looks like for the unlucky victims: What is bad rabbit? Bad Rabbit is a previously unknown r
Publish At:2017-10-24 16:45 | Read:5634 | Comments:0 | Tags:Featured Incidents drive-by attack Ransomware Targeted Attac

New multi platform malware/adware spreading via Facebook Messenger

One good thing about having a lot of Facebook friends is that you simply act as a honey pot when your friends click on malicious things. A few days ago I got a message on Facebook from a person I very rarely speak to, and I knew that something fishy was going on. After just a few minutes analyzing the message, I understood that I was just peeking at the top
Publish At:2017-08-24 05:50 | Read:5072 | Comments:0 | Tags:Incidents Adware Facebook JavaScript Social networks

ExPetr/Petya/NotPetya is a Wiper, Not Ransomware

After an analysis of the encryption routine of the malware used in the Petya/ExPetr attacks, we have thought that the threat actor cannot decrypt victims’ disk, even if a payment was made. This supports the theory that this malware campaign was not designed as a ransomware attack for financial gain. Instead, it appears it was designed as a wiper prete
Publish At:2017-06-28 19:25 | Read:5622 | Comments:0 | Tags:Featured Incidents Petya Ransomware Wiper

Announce

Share high-quality web security related articles with you:)
Tell me why you support me <3