Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 6 / 15
296 résultats taggé malware  ✕
AceCryptor malware has surged in Europe, researchers say https://therecord.media/acecryptor-malware-surge-europe-remcos
20/03/2024 22:39:09
QRCode
archive.org
thumbnail

Researchers at ESET say they spotted thousands of new infections with AceCryptor, which allows malware to slip into systems without being detected by anti-virus software.

therecord.media EN 2024 ESET AceCryptor malware
DarkGate Opens Organizations for Attack via Skype, Teams https://www.trendmicro.com/en_us/research/23/j/darkgate-opens-organizations-for-attack-via-skype-teams.html
14/03/2024 11:31:55
QRCode
archive.org
thumbnail

From July to September, we observed the DarkGate campaign (detected by Trend Micro as TrojanSpy.AutoIt.DARKGATE.AA) abusing instant messaging platforms to deliver a VBA loader script to victims. This script downloaded and executed a second-stage payload consisting of a AutoIT scripting containing the DarkGate malware code. It’s unclear how the originating accounts of the instant messaging applications were compromised, however is hypothesized to be either through leaked credentials available through underground forums or the previous compromise of the parent organization.

trendmicro EN 2024 malware DarkGate Skype Teams
8,000+ Domains of Trusted Brands Hijacked for Massive Spam Operation https://thehackernews.com/2024/02/8000-subdomains-of-trusted-brands.html?m=1
03/03/2024 20:21:17
QRCode
archive.org

Over 8,000 subdomains belonging to recognized brands and organizations are being exploited for malicious email distribution.

thehackernews malware attacks subdomains brands Guardio Labs
European Parliament finds spyware on defense committee members’ phones https://www.politico.eu/article/parliament-defense-subcommittee-phones-checked-for-spyware/
21/02/2024 13:23:07
QRCode
archive.org
thumbnail

Officials handling security and defense issues were the target of phone hacking, internal email says.

Politic EN 2024 spyware Espionage Rule enforcement Data of Elections Cybersecurity Malware Spyware EU defense
Poland's PM says authorities in the previous government widely and illegally used Pegasus spyware | AP News https://apnews.com/article/poland-government-pegasus-spyware-tusk-duda-78420fc7099401926d28b5be98669192
18/02/2024 18:46:33
QRCode
archive.org
thumbnail

Poland’s new prime minister says he has documentation proving that state authorities under the previous government used the powerful Pegasus spyware illegally and targeted a “very long” list of hacking victims.

apnews EN 2024 government spyware Malware Politics Poland Pegasus illegally
Hackers exploit Ivanti SSRF flaw to deploy new DSLog backdoor https://www.bleepingcomputer.com/news/security/hackers-exploit-ivanti-ssrf-flaw-to-deploy-new-dslog-backdoor/
13/02/2024 10:13:40
QRCode
archive.org
thumbnail

Hackers are exploiting a server-side request forgery (SSRF) vulnerability in Ivanti Connect Secure, Policy Secure, and ZTA gateways to deploy the new DSLog backdoor on vulnerable devices.

bleepingcomputer EN 2024 Backdoor Ivanti Malware SSRF Vulnerability Security InfoSec Computer-Security
New RustDoor macOS malware impersonates Visual Studio update https://www.bleepingcomputer.com/news/security/new-rustdoor-macos-malware-impersonates-visual-studio-update/
09/02/2024 17:20:46
QRCode
archive.org
thumbnail

A new Rust-based macOS malware spreading as a Visual Studio update to provide backdoor access to compromised systems uses infrastructure linked to the infamous ALPHV/BlackCat ransomware gang.

bleepingcomputer EN 2024 ALPHV Backdoor BlackCat Data-Exfiltration macOS Malware Ransomware
Chinese spies hacked Dutch defence network last year - intelligence agencies https://www.reuters.com/technology/cybersecurity/china-cyber-spies-hacked-computers-dutch-defence-ministry-report-2024-02-06/
07/02/2024 08:22:11
QRCode
archive.org

Chinese state-backed cyber spies gained access to a Dutch military network last year, Dutch intelligence agencies said on Tuesday, calling it part of a trend of Chinese political espionage against the Netherlands and its allies.

reuters EN 2024 Fortigate NL Netherlands China malware spy
Chinese hackers infect Dutch armed forces network with malware https://www.bleepingcomputer.com/news/security/chinese-hackers-infect-dutch-armed-forces-network-with-malware/
06/02/2024 19:50:53
QRCode
archive.org
thumbnail

A Chinese cyber-espionage group breached the Dutch Ministry of Defence last year and deployed malware on compromised devices, according to the Military Intelligence and Security Service (MIVD) of the Netherlands.

bleepingcomputer EN 2024 Army China COATHANGER Cyber-espionage Defense Fortigate Fortinet Malware Netherlands
DarkGate malware delivered via Microsoft Teams - detection and response https://cybersecurity.att.com/blogs/security-essentials/darkgate-malware-delivered-via-microsoft-teams-detection-and-response
01/02/2024 09:05:20
QRCode
archive.org
thumbnail

While most end users are well-acquainted with the dangers of traditional phishing attacks, such as those delivered via email or other media, a large proportion are likely unaware that Microsoft Teams chats could be a phishing vector. Most Teams activity is intra-organizational, but Microsoft enables External Access by default, which allows members of one organization to add users outside the organization to their Teams chats. Perhaps predictably, this feature has provided malicious actors a new avenue by which to exploit untrained or unaware users.

cybersecurity.att.com EN 2024 Microsoft Teams phishing malware
Evolution of UNC4990: Uncovering USB Malware's Hidden Depths https://www.mandiant.com/resources/blog/unc4990-evolution-usb-malware
31/01/2024 17:36:21
QRCode
archive.org
thumbnail

UNC4990 uses USB devices for initial infection, and is likely motivated by financial gain.

mandiant EN 2024 UNC4990 USB malware
New Go-based Malware Loader Discovered I Arctic Wolf https://arcticwolf.com/resources/blog/cherryloader-a-new-go-based-loader-discovered-in-recent-intrusions/
29/01/2024 18:47:54
QRCode
archive.org
thumbnail

Arctic Wolf Labs has discovered, based on recent intrusion observations, a new Go-based malware loader named CherryLoader

arcticwolf EN 2024 Go-based Malware Loader analysis CherryLoader
Malicious PyPI Packages Slip WhiteSnake InfoStealer Malware onto Windows Machines https://thehackernews.com/2024/01/malicious-pypi-packages-slip-whitesnake.html?m=1
29/01/2024 07:14:13
QRCode
archive.org
thumbnail

Malicious code hiding in seemingly innocent PyPI packages steals your passwords, crypto & more
#attacks #breach #computer #cyber #data #hack #hacker #hacking #how #information #malware #network #news #ransomware #security #software #the #to #today #updates #vulnerability

hacking attacks information network data to updates malware cyber today news ransomware breach security software hack the hacker how computer vulnerability
Info Stealing Packages Hidden in PyPI https://www.fortinet.com/blog/threat-research/info-stealing-packages-hidden-in-pypi
23/01/2024 10:08:55
QRCode
archive.org
thumbnail

An info-stealing PyPI malware author was identified discreetly uploading malicious packages.

FortiGuard-Labs-Threat-Research fortinet 2024 EN PyPI malware Supply-chain-attack
A backdoor with a cryptowallet stealer inside cracked macOS software https://securelist.com/new-macos-backdoor-crypto-stealer/111778/
22/01/2024 10:41:52
QRCode
archive.org
thumbnail

We review a new macOS backdoor that piggybacks on cracked software to replace Bitcoin and Exodus wallets with malware.

securelist EN 2024 Apple MacOS Backdoor Cryptocurrencies DNS Malware Malware-Descriptions Malware-Technologies Trojan Trojan-stealer
Balada Injector Infects Over 7,100 WordPress Sites Using Plugin Vulnerability https://thehackernews.com/2024/01/balada-injector-infects-over-7100.html
20/01/2024 21:19:56
QRCode
archive.org
thumbnail

Over 7,100 WordPress sites have been hit by the 'Balada Injector' malware, which exploits sites using a vulnerable version of the Popup Builder plugin

thehackernews 2024 EN Balada WP plugin WordPress malware Injector infected
Jamf Threat Labs Discovers Pirated macOS Apps Similar to ZuRu Malware https://www.jamf.com/blog/jtl-malware-pirated-applications/
19/01/2024 09:15:51
QRCode
archive.org
thumbnail

Jamf Threat Labs discovers new pirated macOS applications that establish communication with attacker infrastructure, allowing the victim's computer to be controlled by the attacker.

jamf EN 2024 macOS Malware pirated applications
MacOS info-stealers quickly evolve to evade XProtect detection https://www.bleepingcomputer.com/news/security/macos-info-stealers-quickly-evolve-to-evade-xprotect-detection/
17/01/2024 19:24:07
QRCode
archive.org
thumbnail

Multiple information stealers for the macOS platform have demonstrated the capability to evade detection even when security companies follow and report about new variants frequently.

bleepingcomputer EN 2024 Information Malware Security Apple Evasion Stealer Info XProtect InfoSec Computer macOS
iShutdown scripts can help detect iOS spyware on your iPhone https://www.bleepingcomputer.com/news/security/ishutdown-scripts-can-help-detect-ios-spyware-on-your-iphone/
17/01/2024 19:23:42
QRCode
archive.org
thumbnail

Security researchers found that infections with high-profile spyware Pegasus, Reign, and Predator could be discovered on compromised Apple mobile devices by checking Shutdown.log, a system log file that stores reboot events.

bleepingcomputer EN 2024 Spyware iPhone Malware Security Apple iOS Pegasus InfoSec Logging Computer
Analyzing DPRK's SpectralBlur https://objective-see.org/blog/blog_0x78.html
05/01/2024 12:38:58
QRCode
archive.org
thumbnail

In both his twitter (err, X) thread and in a subsequent posting he provided a comprehensive background and triage of the malware dubbed SpectralBlur. In terms of its capabilities he noted:

SpectralBlur is a moderately capable backdoor, that can upload/download files, run a shell, update its configuration, delete files, hibernate or sleep, based on commands issued from the C2. -Greg
He also pointed out similarities to/overlaps with the DPRK malware known as KandyKorn (that we covered in our “Mac Malware of 2024” report), while also pointing out there was differences, leading him to conclude:

We can see some similarities ... to the KandyKorn. But these feel like families developed by different folks with the same sort of requirements. -Greg

objective-see EN 2024 Analysis macOS backdoor SpectralBlur malware
page 6 / 15
4260 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio