HackDig : Dig high-quality web security articles for hacker

Coronavirus-themed attacks March 29 – April 04, 2020

In this post, I decided to share the details of the Coronavirus-themed attacks launched from March 29 to April 04, 2020. Threat actors exploit the interest in the COVID19 outbreak while infections increase worldwide, experts are observing new campaigns on a daily bases. Below a list of attacks detected this week. March 30, 2020 – Your colleagu
Publish At:2020-04-05 06:40 | Read:66 | Comments:0 | Tags:Breaking News Cyber Crime Hacking Malware Security coronavir

Security Affairs newsletter Round 258

A new round of the weekly newsletter arrived! The best news of the week with Security Affairs Coronavirus-themed attacks March 22 – March 28, 2020FIN7 hackers target enterprises with weaponized USB drives via USPSSource code of Dharma ransomware now surfacing on public hacking forumsCrooks leverage Zooms popularity in Coronavirus outbreak to serve malware
Publish At:2020-04-05 06:05 | Read:46 | Comments:0 | Tags:Breaking News Cyber Crime Cyber warfare Hacking Intelligence

New Coronavirus-themed campaign spread Lokibot worldwide

Researchers spotted a new Coronavirus-themed attack, the messages pretend to be sent from the World Health Organization to deliver Lokibot infostealer. Security experts at FortiGuard Labs discovered a new Coronavirus-themed campaign using alleged messages from the World Health Organization (WHO) to deliver the LokiBot trojan. The campaign was uncovered
Publish At:2020-04-04 19:08 | Read:114 | Comments:0 | Tags:Breaking News Cyber Crime Hacking Malware coronavirus covid1

Magecart group 7 use new e-skimmer to steal payment data

RiskIQ researchers spotted a new ongoing Magecart campaign that already compromised at least 19 different e-commerce websites. Researchers from security firm RiskIQ have uncovered a new ongoing Magecart campaign that already compromised at least 19 different e-commerce websites to steal customers’ payment card data. The experts discovered a new s
Publish At:2020-04-04 15:17 | Read:13 | Comments:0 | Tags:Breaking News Cyber Crime Hacking Malware Cybercrime hacking

Microsoft’s case study: Emotet took down an entire network in just 8 days

Microsoft declared that an Emotet attack took down an organization’s network by overheating all the computers and bringing its Internet access down. Microsoft shared details of the Emotet attack suffered by an organization named Fabrikam in the Microsoft’s Detection and Response Team (DART) Case Report 002, where Fabrikam is a fake name the I
Publish At:2020-04-04 15:17 | Read:80 | Comments:0 | Tags:Breaking News Hacking EMOTET information security news it se

2020’s Most (and Least) Cyber-Secure States

Reading Time: ~ 2 min. For the past several years, Webroot and its partners have conducted a series of studies aimed at better understanding the attitudes, perspectives, and behaviors related to cyber hygiene in United States. This helps users determine which behaviors put them most at risk and which behavioral changes could help increase their cyber resilie
Publish At:2020-04-04 15:10 | Read:7 | Comments:0 | Tags:Home + Mobile malware phishing

Zoomed In: A Look into a Coinminer Bundled with Zoom Installer

By Raphael Centeno and Llallum Victoria Many companies around the world have transitioned to work-from-home arrangements because of growing concerns over the COVID-19 global health crisis. This new setup has highlighted the usefulness of video conferencing apps. These platforms have been utilized by companies and remote workforces to hold meetings and for ot
Publish At:2020-04-04 13:17 | Read:110 | Comments:0 | Tags:Malware coinminer Zoom

Handling Malware Delivered Into .daa Files

Bad guys are always trying to use “exotic” file extensions to deliver their malicious payloads. If common dangerous extensions are often blocked by mail security gateways, there exists plenty of less common extensions. These days, with the COVID19 pandemic, we are facing a peak of phishing and scams trying to lure victims. I spotted one that uses
Publish At:2020-04-03 09:16 | Read:108 | Comments:0 | Tags:Malware Security Software DAA PowerISO

Firefox, IE Vulnerabilities Exploited in Attacks on China, Japan

Vulnerabilities patched earlier this year in Firefox and Internet Explorer have been exploited by an advanced persistent threat (APT) actor in attacks aimed at China and Japan.The Firefox vulnerability is CVE-2019-17026, which Mozilla patched in early January, and the Internet Explorer flaw is CVE-2020-0674, which Microsoft patched in February with its month
Publish At:2020-04-02 12:27 | Read:71 | Comments:0 | Tags:Cyberwarfare NEWS & INDUSTRY Virus & Threats Virus &

New COVID19 wiper overwrites MBR making computers unusable

A recently discovered strain of malware exploits the current COVID19 pandemic to render computers unusable by overwriting the MBR. SonicWall’s security researchers have discovered a new piece of malware that exploits the current COVID19 outbreak to render computers unusable by overwriting the master boot record (MBR). Unfortunately, this is one of the
Publish At:2020-04-02 11:00 | Read:119 | Comments:0 | Tags:Breaking News Cyber Crime Malware coronavirus covid19 hackin

Crooks use tainted Zoom apps to target users at home due to Coronavirus outbreak

Crooks target Android users working from home due to the Coronavirus outbreak with a Trojanized version of the popular video messaging app Zoom. Security experts from Bitdefender have spotted tainted versions of the Android Zoom video-conferencing application that is targeting users working from home due to the Coronavirus outbreak. Researchers detecte
Publish At:2020-04-02 09:58 | Read:91 | Comments:0 | Tags:Breaking News Cyber Crime Malware Mobile Android coronavirus

Coronavirus Malware Makes Devices Unusable by Overwriting MBR

A newly discovered piece of malware is taking advantage of the current COVID-19 pandemic to render computers unusable by overwriting the MBR (master boot record).Cybercriminals were quick to exploit the coronavirus crisis for their malicious attacks, including phishing, malware infections, and the likes, and it did not take long for state-sponsored threat ac
Publish At:2020-04-02 08:39 | Read:128 | Comments:0 | Tags:NEWS & INDUSTRY Virus & Threats Virus & Malware

Nigerian Threat Actors Specializing in BEC Attacks Continue to Evolve

The Nigerian business email compromise (BEC) threat actors referred to as SilverTerrier have intensified assaults on multiple industries and should be considered an established threat, Palo Alto Networks says.In February, the FBI’s Internet Crime Complaint Center (IC3) revealed that reported BEC and email account compromise (EAC) losses topped $1.7 billion,
Publish At:2020-04-02 06:45 | Read:154 | Comments:0 | Tags:NEWS & INDUSTRY Fraud & Identity Theft Malware Cyber

Vollgar Campaign Targets MS-SQL Servers With Backdoors, Crypto-Miners

A recently uncovered attack campaign that stayed under the radar since May 2018 is targeting devices running MS-SQL servers with backdoors and crypto-miners, Guardicore Labs reveals.Dubbed Vollgar, the campaign managed to infect roughly three thousand database machines daily, with victims in sectors such as healthcare, aviation, IT and telecommunications, an
Publish At:2020-04-02 01:04 | Read:107 | Comments:0 | Tags:NEWS & INDUSTRY Virus & Threats Virus & Malware

Vollgar botnet has managed to infect around 3k MSSQL DB servers daily

Cybersecurity researchers spotted a crypto-mining botnet, tracked as Vollgar, that has been hijacking MSSQL servers since at least 2018. Researchers at Guardicore Labs discovered a crypto-mining botnet, tracked as Vollgar botnet, that is targeting MSSQL databases since 2018. The botnet is used to launch brute-force attacks against MSSQL databases to take
Publish At:2020-04-01 15:00 | Read:162 | Comments:0 | Tags:Breaking News Cyber Crime Malware botnet crypto Hacking it s


Share high-quality web security related articles with you:)


Tag Cloud