Wednesday, August 31, 2022

Hackers Use ModernLoader to Infect Systems with Stealers and Cryptominers

As many as three disparate but related campaigns between March and Jun 2022 have been found to deliver a variety of malware, including ModernLoader, RedLine Stealer, and cryptocurrency miners onto compromised systems.

"The actors use PowerShell, .NET assemblies, and HTA and VBS files to spread across a targeted network, eventually dropping other pieces of malware, such as the SystemBC trojan and DCRat , to enable various stages of their operations," Cisco Talos researcher Vanja Svajcer said in a report ...

Publisher: The Hacker News
Author: https www facebook com thehackernews
Twitter: @TheHackersNews
Reference: (Read more) Visit Source



Chinese Hackers Used ScanBox Framework in Recent Cyber Espionage Attacks

"The targets of this recent campaign spanned Australia, Malaysia, and Europe, as well as entities that operate in the South China Sea," enterprise security firm Proofpoint said in a published in partnership with PwC.

Targets encompass local and federal Australian Governmental agencies, Australian news media companies, and global heavy industry manufacturers which conduct maintenance of fleets of wind turbines in the South China Sea.

Publisher: The Hacker News
Author: https www facebook com thehackernews
Twitter: @TheHackersNews
Reference: (Read more) Visit Source



White Hat Hackers: Who are They? And Why do we Need Them?

In just the first quarter of 2022 alone, internet users experienced about 18 million data breaches.

Let's first figure out who hackers are in general. These people breach into the system for their own benefit or on order. 

White hat hackers are those who fight from the other side. Their main task is to make the system as secure as possible . They are experts in cyber defense who develop protection systems against other hackers and their attacks.

logo
Publisher: BeInCrypto
Date: 2022-08-31T02:13:50 00:00
Twitter: @beincrypto
Reference: (Read more) Visit Source



Soul Hackers 2: how to recruit demons | Digital Trends

Shin Megami Tensei games, whether it be the main series or any of the numerous spin-offs, all center around battling and collecting demons. Sometimes compared to the Pokemon franchise, SMT's demons do have a lot in common with that series in terms of how they function.

Recruiting demons in Soul Hackers 2 is a very different process than how fans of the Persona series know it to be. In that game, you enter into demon negotiations where you talk with demons to try and lure them to your side, often costing some cash, while fighting them.

logo
Publisher: Digital Trends
Date: 2022-08-30T22:45:59 00:00
Reference: (Read more) Visit Source



FBI: Hackers Are Exploiting DeFi Bugs to Steal Funds - Infosecurity Magazine

Cyber-criminals are increasingly exploiting bugs in decentralized finance (DeFi) platforms to steal investor funds, the FBI has warned.

In a Public Service Announcement (PSA) yesterday, the Feds claimed that vulnerabilities in smart contract code have been targeted in several ways, including:

Publisher: Infosecurity Magazine
Date: 2022-08-30T10:30:00
Author: Phil Muncaster
Twitter: @InfosecurityMag
Reference: (Read more) Visit Source



Hackers hide malware in James Webb telescope images

The malware is written in Golang, a programming language that is gaining popularity among cybercriminals because it is cross-platform (Windows, Linux, Mac) and offers increased resistance to reverse engineering and analysis.

In the recent campaign discovered by researchers at Securonix, the threat actor drops payloads that are currently not marked as malicious by antivirus engines on the VirusTotal scanning platform.

Publisher: BleepingComputer
Twitter: @BleepinComputer
Reference: (Read more) Visit Source



Montenegro cyberattack: Russian hackers blamed for infrastructure hack

Montenegro issued a warning over a massive ongoing cyberattack against government services and key public infrastructure including power plants and water supplies.

The Montenegrin Agency for National Security (ANB) said the country had been caught up in a "hybrid war", with Russia using state-backed hackers to bring down infrastructure.

logo
Publisher: Tech Monitor
Date: 2022-08-30T13:25:51 00:00
Author: Ryan Morrison
Twitter: @techmonitorai
Reference: (Read more) Visit Source



Microsoft Excel attacks fall out of fashion with hackers

"The prominent malware distributed via malicious Excel 4.0 macros was QakBot and Emotet. QakBot switched to a complex infection chain using HTML smuggling and DLL side-loading, which we highlight later in this report."

With Excel macros turned off by default, the researchers found that many of the larger malware groups had to find other ways of infecting machines with more complicated methods. The above-mentioned Qakbot was one extreme example.

Publisher: SearchSecurity
Date: 08/30/2022
Twitter: @SearchSecurity
Reference: (Read more) Visit Source



OODA Loop - Russian hackers gain powerful 'MagicWeb' authentication bypass

Nobelium, a highly active Russian threat actor, has a new technique for bypassing authentication, according to Microsoft.

The US and the UK believe that the hackers are operating on behalf of the Russian Foreign Intelligence Service (SVR) due to the high-profile nature of its attacks. The threat actor is known for attacks against the supply chain, particularly the SolarWinds attack that targeted 18,000 customers.

logo
Publisher: OODA Loop
Date: 2022-08-30T09:39:25-04:00
Author: OODA Analyst
Twitter: @ooda
Reference: (Read more) Visit Source



Security Breach at Password Manager LastPass as Hackers Steal Source Code and Proprietary ...

LastPass offers multi-factor authentication (MFA) for additional account security, but that might not protect against every possible avenue of attack that internal information could reveal.

There is also the possibility of a “cascading” attack on other websites and businesses via their own internal administrative accounts, as LastPass counts a number of major businesses among their customers: State Farm, Patagonia and Yelp among them, with the company claiming that it ...

logo
Publisher: CPO Magazine
Date: 2022-08-30T16:00:00 00:00
Author: Scott Ikeda
Twitter: @cpomagazine
Reference: (Read more) Visit Source






Trance Party Event Tickets

A Concert Like No Other


Hop aboard a shuttle to Kepler-1649c. Be there to welcome new lifeforms into the universe. All passengers must have a verified event ticket. There are 10,000 tickets in circulation so no need to panic. Limited seating available per trip. There will be multiple flights each hour shipping off from the NORAD Space Port in Iceland.

Event tickets are non refundable & non transferable (except on the black market. Call Sal with questions.) An event ticket can be reused for up to 9900 yearly transactions.

No sandals allowed on flight. Adults only. Kittens must show a custodian's ID at the gate. You are not allowed to get married while aboard the shuttle. Please arrive early if you are wearing jeans.

NB: EVENT TICKETS CONTAIN A PRIVATE ANONYMOUS DIGITAL IMPRINT.

Reserve your spot. Click here.




No comments:

Post a Comment