HackDig : Dig high-quality web security articles for hacker

Criminals hack Tupperware website with credit card skimmer

On March 20, Malwarebytes identified a targeted cyberattack against household brand Tupperware and its associated websites that is still active today. We attempted to alert Tupperware immediately after our discovery, but none of our calls or emails were answered. Threat actors compromised the official tupperware[.]com site—which averages close to 1 millio
Publish At:2020-03-25 14:34 | Read:191 | Comments:0 | Tags:Hacking credit card Magecart skimmer skimming steganography

WOOF locker: Unmasking the browser locker behind a stealthy tech support scam operation

In the early days, practically all tech support scammers would get their own leads by doing some amateur SEO poisoning and keyword stuffing on YouTube and other social media sites. They’d then leverage their boiler room to answer incoming calls from victims. Today, these practices continue, but we are seeing more advanced operations with a clear sep
Publish At:2020-01-22 16:50 | Read:414 | Comments:0 | Tags:Threat analysis 404Browlock 404error browlock browlocks Brow

New evasion techniques found in web skimmers

For a number of years, criminals have been able to steal credit card details from unaware online shoppers without attracting too much attention. Few people in the security industry were talking about these credit card web skimmers, both server-side and client-side, before the latter became largely known as Magecart. It took some major incidents, notably t
Publish At:2020-01-02 16:50 | Read:587 | Comments:0 | Tags:Threat analysis credit card Magecart skimmer steganography w

REDBALDKNIGHT/BRONZE BULTER’s Daserf Backdoor Now Using Steganography

by Joey Chen and MingYen Hsieh (Threat Analysts) REDBALDKNIGHT, also known as BRONZE BUTLER and Tick, is a cyberespionage group known to target Japanese organizations such as government agencies (including defense) as well as those in biotechnology, electronics manufacturing, and industrial chemistry. Their campaigns employ the Daserf backdoor (detected by T
Publish At:2017-11-07 11:35 | Read:22929 | Comments:2 | Tags:Malware Targeted Attacks Vulnerabilities BRONZE BULTER Daser

A simple example of a complex cyberattack

We’re already used to the fact that complex cyberattacks use 0-day vulnerabilities, bypassing digital signature checks, virtual file systems, non-standard encryption algorithms and other tricks. Sometimes, however, all of this may be done in much simpler ways, as was the case in the malicious campaign that we detected a while ago – we named it ‘M
Publish At:2017-09-26 14:25 | Read:3640 | Comments:0 | Tags:Research DLL hijacking Dropper Microsoft Word Social Enginee

Steganography in contemporary cyberattacks

Steganography is the practice of sending data in a concealed format so the very fact of sending the data is disguised. The word steganography is a combination of the Greek words στεγανός (steganos), meaning “covered, concealed, or protected”, and γράφειν (graphein) meaning “writing”. Unlike cryptography, which conceals the cont
Publish At:2017-08-03 06:35 | Read:4705 | Comments:0 | Tags:Publications APT Crypto steganography

How to Hide Information with Ordinary Office Printers

The printer you have in your office may be less innocent than you thought. Some experts have already shown that they can even become a steganographic tool, the art, well-known in computer security, of hiding information from prying eyes. A few years ago, the Electronic Frontier Foundation, an organization that defends civil liberties on the internet, reporte
Publish At:2017-01-26 15:35 | Read:3631 | Comments:0 | Tags:Technology printers security steganography

Sundown Exploit Kit now leverages on the steganography

A new variant of the Sundown exploit kit leverages on steganography to hide exploit code in harmless-looking image files. Security experts from Trend Micro have spotted a new version of the Sundown exploit kit that exploits steganography in order to hide malicious code in harmless-looking image files. The use of steganography was recently observed in the mal
Publish At:2016-12-30 20:05 | Read:3408 | Comments:0 | Tags:Breaking News Cyber Crime Malware Cybercrime malware Stegano

Updated Sundown Exploit Kit Uses Steganography

This year has seen a big shift in the exploit kit landscape, with many of the bigger players unexpectedly dropping out of action. The Nuclear exploit kit operations started dwindling in May, Angler disappeared around the same time Russia’s Federal Security Service made nearly 50 arrests last June, and then in September Neutrino reportedly went private and sh
Publish At:2016-12-29 13:35 | Read:5077 | Comments:0 | Tags:Exploits Malware Vulnerabilities exploit kit steganography S

Dozens of games infected with Xiny available on the Google Play

Experts at Dr Web discovered dozens of Android game apps in the Google Play Store have been infected with the Android.Xiny Trojan. Bad news for Android users, according to the security Doctor Web firm dozens of game apps in the Google Play Store have been infected with the Android.Xiny.19.origin Trojan. The malware could allow
Publish At:2016-02-01 12:55 | Read:3793 | Comments:0 | Tags:Breaking News Malware Mobile Android Android.Xiny Dr.Web gam

Attackers Embracing Steganography to Hide Communication

Encouraged by patterns carried out on a larger scale recently, researchers believe digital steganography has arrived as a legitimate method for attackers to use when it comes to obscuring communication between command and control servers.In a presentation last week at Black Hat Europe researchers with Crowdstrike and Dell SecureWorks cited a handful of campa
Publish At:2015-11-18 22:00 | Read:4510 | Comments:0 | Tags:Malware Black Hat Black Hat Europe Crowdstrike Dell SecureWo

Is Stegomalware in Google Play a Real Threat?

By Alfonso Muñoz @mindcryptFor several decades, the science of steganography hasbeen used to hide malicious code (useful in intrusions) or to create covertchannels (useful in information leakage). Nowadays, steganography can be appliedto almost any logical/physical medium (format files, images, audio, video,text, protocols, programming languages, file
Publish At:2015-09-22 14:55 | Read:6998 | Comments:0 | Tags:alfonso muñoz android crypto Cryptography google play hackin

New Hammertoss Espionage Tool Tied to MiniDuke Gang

The espionage gang behind the MiniDuke backdoor uncovered by Kaspersky Lab and CrySys Lab in 2013 has surfaced again with a new backdoor and attack platform that is used sparingly against only high-value targets.The new data theft tool, called Hammertoss, is a study not only in espionage capabilities, but also stealth and targeting. It’s been found so
Publish At:2015-07-29 20:05 | Read:2662 | Comments:0 | Tags:Cryptography Government Malware Privacy Web Security apt APT

US Healthcare companies are the most targeted by Stegoloader

The authors of the Stegoloader malware are exploiting digital steganography to target companies worldwide, mainly US Healthcare companies. A couple of weeks ago, the security researchers at Dell SecureWorks discovered a new strain of malware dubbed Stegoloader, that exploits steganography as an evasion technique. Once infected
Publish At:2015-06-28 20:45 | Read:4251 | Comments:0 | Tags:Breaking News Cyber Crime Malware healthcare Information Ste

US Healthcare Organizations Most Affected by Stegoloader Trojan

Most victims of the Stegoloader Trojan, which has recently been making its rounds in the news, are observed to come from healthcare organizations in North America.  The malware known as TROJ_GATAK has been active since 2012 and uses steganography techniques to hide components in .PNG files. Looking at recent victims of the Stegoloader malware, we observed th
Publish At:2015-06-24 18:35 | Read:3371 | Comments:0 | Tags:Malware GATAK steganography stegoloader


Share high-quality web security related articles with you:)


Tag Cloud