HackDig : Dig high-quality web security articles

Bumblebee attacks, from initial access to the compromise of Active Directory Services

Threat actors are using the Bumblebee loader to compromise Active Directory services as part of post-exploitation activities. The Cybereason Global Security Operations Center (GSOC) Team analyzed a cyberattack that involved the Bumblebee Loader and detailed how the attackers were able to compromise the entire network. Most Bumblebee infe
Publish At:2022-08-19 05:27 | Read:106 | Comments:0 | Tags:Breaking News Malware Security bumblebee Cybercrime Hacking

TXOne Networks Scores $70M Series B Investment

TXOne Networks, a joint venture between cybersecurity firm Trend Micro and industrial networking solutions provider Moxa, has banked $70 million in new venture capital funding.The company, which maintains dual headquarters in Texas and Taiwan, said the Series B round was led by TGVest Capital and brings the total raised to $94 million.TXOne Networks was crea
Publish At:2022-08-18 16:14 | Read:131 | Comments:0 | Tags:Endpoint Security Network Security NEWS & INDUSTRY Priva

BlackByte ransomware v2 is out with new extortion novelties

A new version of the BlackByte ransomware appeared in the threat landscape, version 2.0 uses extortion techniques similar to LockBit ones. BlackByte ransomware Version 2.0 appeared in the threat landscape after a short break, the latest version has a new data leak site. It is interesting to note that the group introduced some novelties in the extortion
Publish At:2022-08-18 13:35 | Read:113 | Comments:0 | Tags:Breaking News Cyber Crime Malware Cybercrime Hacking hacking

From Ramnit To Bumblebee (via NeverQuest): Similarities and Code Overlap Shed Light On Relationships Between Malware Dev

A comparative analysis performed by IBM Security X-Force uncovered evidence that suggests Bumblebee malware, which first appeared in the wild last year, was likely developed directly from source code associated with the Ramnit banking trojan. This newly discovered connection is particularly interesting as campaign activity has so far linked Bumblebee to aff
Publish At:2022-08-18 13:22 | Read:109 | Comments:0 | Tags:Endpoint Incident Response Intelligence & Analytics Malware

North Korean Hackers Use Fake Job Offers to Deliver New macOS Malware

Researchers with cybersecurity company ESET have observed a new macOS malware sample developed by the infamous North Korean advanced persistent threat (APT) actor Lazarus.Believed to be backed by the North Korean government, Lazarus has been active since at least 2009, orchestrating various high-profile attacks, including numerous assaults on cryptocurrency
Publish At:2022-08-18 12:16 | Read:69 | Comments:0 | Tags:NEWS & INDUSTRY Virus & Threats Virus & Malware

Russian Man Extradited to US for Laundering Ryuk Ransomware Money

A Russian national has been extradited from the Netherlands to the United States, where he faces charges related to his alleged role in the Ryuk ransomware operation.The suspect is 29-year-old Denis Mihaqlovic Dubnikov, whose trial is scheduled to begin on October 4.According to authorities, cybercriminals who had been using the Ryuk ransomware to extort mon
Publish At:2022-08-18 08:18 | Read:84 | Comments:0 | Tags:NEWS & INDUSTRY Malware Cybercrime ransomware

Apple Patches New macOS, iOS Zero-Days

Apple on Wednesday rolled out emergency patches for a pair of already exploited zero-day vulnerabilities in its flagship macOS and iOS platforms.Apple confirmed in-the-wild exploitation of the vulnerabilities in separate advisories warning about code execution flaws in fully patched iPhone, iPad and macOS devices.Barebones details from Apple’s advisories:CVE
Publish At:2022-08-17 16:26 | Read:91 | Comments:0 | Tags:Disaster Recovery Endpoint Security Mobile Security Network

Bugdrop dropper includes features to circumvent Google’s security Controls

Researchers have discovered a previously undocumented Android dropper, dubbed BugDrop, that’s still under development. Recently, researchers from ThreatFabric discovered a previously undetected Android dropper, dubbed BugDrop, which is under active development and was designed to bypass security features that will be implemented in the next release
Publish At:2022-08-17 14:23 | Read:98 | Comments:0 | Tags:Breaking News Cyber Crime Malware Mobile Android BugDrop Cyb

81% of Malware Seen on USB Drives in Industrial Facilities Can Disrupt ICS: Honeywell

A significant percentage of the malware seen last year on USB drives used in industrial facilities was capable of targeting and disrupting industrial control systems (ICS), according to a report published this week by Honeywell.The industrial giant has published its fourth annual report focusing on the malware found by one of its dedicated security products
Publish At:2022-08-17 12:28 | Read:153 | Comments:0 | Tags:ICS/OT NEWS & INDUSTRY Virus & Threats Virus & M

Vulnerability Broker Applies Pressure on Software Vendors Shipping Faulty, Incomplete Patches

Trend Micro’s Zero Day Initiative, a major player in the vulnerability disclosure ecosystem, is ramping up the pressure on software vendors that consistently ship faulty security patches.In a major revision of its disclosure policies, the vulnerability broker said it will set strict 30-day deadlines for critical-level bug reports that result from faulty or i
Publish At:2022-08-17 12:28 | Read:141 | Comments:0 | Tags:Cyberwarfare Endpoint Security Network Security NEWS & I

North Korea-linked APT targets Job Seekers with macOS malware

The North Korea-linked Lazarus Group has been observed targeting job seekers with macOS malware working also on Intel and M1 chipsets. ESET researchers continue to monitor a cyberespionage campaign, tracked as “Operation In(ter)ception,” that has been active at least since June 2020. The campaign targets employees working in the aerospace and
Publish At:2022-08-17 06:27 | Read:108 | Comments:0 | Tags:Breaking News Cyber warfare Intelligence Malware Hacking hac

Clop gang targeted UK drinking water supplier South Staffordshire Water

A cyber attack disrupted the IT operations of South Staffordshire Water, a company supplying drinking water to 1.6M consumers daily. South Staffordshire Water has issued a statement confirming the security breach, the company pointed out that the attack did not impact the safety and water distribution systems. South Staffordshire Water plc known as Sou
Publish At:2022-08-16 13:59 | Read:167 | Comments:0 | Tags:Breaking News Cyber Crime ICS-SCADA Malware clop ransomware

Two more malicious Python packages in the PyPI

On August 8, CheckPoint published a report on ten malicious Python packages in the Python Package Index (PyPI), the most popular Python repository among software developers. The malicious packages were intended to steal developers’ personal data and credentials. Following this research, we used our internal automated system for monitoring open-source r
Publish At:2022-08-16 09:44 | Read:163 | Comments:0 | Tags:Incidents Credentials theft Data theft Malware Open source P

Russia-linked Gamaredon APT continues to target Ukraine

Russia-linked Gamaredon APT group targets Ukrainian entities with PowerShell info-stealer malware dubbed GammaLoad. Russia-linked Gamaredon APT group (aka Shuckworm, Actinium, Armageddon, Primitive Bear, and Trident Ursa) targets Ukrainian entities with PowerShell info-stealer malware dubbed GammaLoad, Symantec warns. The Computer Emergency Respon
Publish At:2022-08-16 06:03 | Read:186 | Comments:0 | Tags:APT Breaking News Cyber warfare Malware Gamaredon Hacking ha

Microsoft Announces Disruption of Russian Espionage APT

Microsoft on Monday announced another major disruption of an APT actor believed to be linked to the Russian government, cutting off access to accounts used for pre-attack reconnaissance, phishing, and email harvesting.The threat actor, identified by Microsoft as SEABORGIUM, has been documented since at least 2017 actively conducting cyberespionage attacks ag
Publish At:2022-08-15 16:50 | Read:159 | Comments:0 | Tags:Cyberwarfare Endpoint Security Network Security NEWS & I


Share high-quality web security related articles with you:)
Tell me why you support me <3

Tag Cloud