An unknown threat actor has been employing a “ complex and powerful” malware loader for deploying cryptocurrency miners on affected systems and possibly allowing…
General
FataIRAT’s new variant used by Purple Fox malware operators
Purple Fox malware operators have expanded their malware arsenal and now possess a new variant of a remote access trojan FataIRAT. Further, at the…
Attacks targeting Android and iPhone users for stealing cryptocurrency uncovered
Researchers have uncovered a malicious scheme mainly directed towards Chinese users via fake apps on Android and iOS that resemble genuine digital wallet services…
Azure developers targeted by more than 200 NPM malicious packages
A new massive supply chain attack targeting Azure developers for stealing personal information has deployed more than 218 malicious NPM packages. “After manually inspecting…
BitRAT Spreads as Windows 10 license activator over the Internet as a cheap and elusive
Analysts from AhnLab, a company specialized in cybersecurity, revealed the spread of a new but already known virus called BitRAT. What is BitRAT? BitRAT,…
A New Backdoor and a Unique Attack Chain – Slithering Serpent
A new email campaign attacking French entities uses a highly evasive attack chain. The phishing campaign is installing a new backdoor named Serpent. Initial…
Botnet Malware jeopardises over 2,00,000 Mikro Tik routers
Mikro Tik’s vulnerable routers have been used in one of the largest botnet-as-a-service cybercrime, according to cybersecurity researchers. Avast published a new piece of…
New Browser-in-the Browser (BITB) Attack Makes Phishing Nearly Undetectable
Can web browsers protect us, even if it is HTTPS? Maybe yes, but not with the novel BitB attack, which fakes us by a…
Gh0stCringe Targets Weakly Configured Microsoft SQL, MySQL Servers
Researchers have identified that the actors behind the Gh0stCringe remote access trojan are targeting Microsoft SQL and MySQL database servers. Gh0stCringe, which is thought…
Dell BIOS bugs impact millions of Inspiron, Vostro, XPS, Alienware systems.
Five new vulnerabilities have been found in Dell BIOS; if the vulnerabilities are successfully exploited, the systems can have codes executed remotely. The Dell…