Thursday, February 17, 2022

Hackers Circulate Malware by Breaking Into Microsoft Teams Meetings | PCMag

Hackers Circulate Malware by Breaking Into Microsoft Teams Meetings | PCMag

Hackers have been spotted infiltrating Microsoft Teams meetings with the goal of circulating malware to unsuspecting users. 

Once inside a meeting, hackers will drop a malicious executable file that pretends to be a legitimate program called “User Centric." If a user installs it, the Trojan program will drop malicious DLL files on the PC, which can allow the hacker to remotely hijack the system. 

Publisher: PCMAG
Twitter: @pcmag
Reference: (Read more) Visit Source



Hackers Had Access to Red Cross Network for 70 Days | SecurityWeek.Com

One month after disclosing a data breach that affected roughly 515,000 people, the International Committee of the Red Cross (ICRC) announced that the hackers had access to its network for 70 days before the attack was discovered.

The attackers gained access to the Red Cross network on November 9, 2021, by exploiting CVE-2021-40539 , a critical-severity authentication bypass flaw in Zoho's ManageEngine ADSelfService Plus, ICRC explains in an updated FAQ .

Reference: (Read more) Visit Source



Moses Staff Hackers Targeting Israeli Organizations for Cyber Espionage

First publicly documented in late 2021, Moses Staff is believed to be sponsored by the Iranian government, with attacks reported against entities in Israel, Italy, India, Germany, Chile, Turkey, the U.A.E., and the U.S.

Earlier this month, the hacker collective was observed incorporating a previously undocumented remote access trojan (RAT) called " StrifeWater " that masquerades as the Windows Calculator app to evade detection.

Publisher: The Hacker News
Author: https www facebook com thehackernews
Twitter: @TheHackersNews
Reference: (Read more) Visit Source



How Ethical Hacking Can Stop Hackers

You may have heard of ethical hacking or “white-hat” hacking. It’s an increasingly widely utilized way to help companies uncover vulnerabilities that hackers may exploit later.

Ethical hacking occurs when a person receives permission to attempt to break into an app or system or steal data. The individual mimics the efforts a malicious hacker would likely make. They then provide a report of identified vulnerabilities and suggested steps for remediation.

logo
Publisher: MUO
Date: 2022-02-16T17:00:13Z
Twitter: @MUO_official
Reference: (Read more) Visit Source



Devious hackers are using NFT hype to hijack your PC and webcam | ZDNet

Danny Palmer is a senior reporter at ZDNet. Based in London, he writes about issues including cybersecurity, hacking and malware threats.

BitRAT is a remote access trojan (RAT) that first emerged for sale in underground forums in August 2020. What makes it notable is it can bypass User Account Control (UAC), a Windows feature that helps to prevent unauthorised changes to the operating system.

logo
Publisher: ZDNet
Author: Danny Palmer
Twitter: @ZDNet
Reference: (Read more) Visit Source



Cybercrime focus of Justice Department crackdown on global hackers

In a speech to attendees at the annual Munich Security Conference, Deputy Attorney General Lisa Monaco unveiled several new initiatives by the Justice Department and FBI that she said will speed up their transformations into the kind of high-tech law enforcement agencies required to go after

"Ransomware and digital extortion – like many other crimes that are fueled by cryptocurrency – only work if the bad guys get paid,which means we have to bust their business model," Monaco said.

Publisher: USA TODAY
Author: Josh Meyer
Reference: (Read more) Visit Source



Canada Freedom Convoy: GiveSendGo demands FBI probe hackers, alleges 'highly

The executive director of the Canadian Civil Liberties Association said Trudeau's 'emergency' invoked too much power that was unwarranted for the situation.

The notorious Canadian hacker Aubrey Cottle, known as Kirtaner, seemed to take partial credit for the cyberattack on the Freedom Convoy 2022's campaign in a TikTok video circulating online.

Publisher: Fox News
Date: 2022-02-16
Twitter: @foxnews
Reference: (Read more) Visit Source



Hackers to face 25 years in jail for cyber attacks on Australia's national infrastructure |

The bill also makes adjustments to the law governing unauthorised access to, or the modification of, restricted data and unauthorised impairment of data held on a computer disk. In this case the maximum jail term will increase from two years to five years.

"Although a positive step in the fight against cybercriminals, this deterrent will by no means be the end of ransomware in Australia," said Camellia Chan, CEO and Founder of X-PHY. "It is imperative that organisations do not rest on their laurels despite tougher punishments for criminals.

Publisher: IT PRO
Author: Zach Marzouk
Twitter: @ITPro
Reference: (Read more) Visit Source



No comments:

Post a Comment