In recent months, Chaos, a new, multi-functional Go-based virus, has seen a sharp increase in volume to capture a variety of Windows, Linux, SOHO routers, and enterprise servers into its botnet. According to experts at Lumen’s Black Lotus Labs, “Chaos…
Latest posts - Page 34
Attack on the Chilean court system using ransomware
In September, a raft of cyber disruptions hit the South American nation. In order to combat the spread of a virus that fraudulently encrypts files, the Chilean judiciary shut down 150 computers. Despite assurances from officials that most court procedures…
85 Apps with 13 million Downloads Found to Be Part of Ad Fraud Scheme by Experts
In an ongoing effort that started in 2019, as many as 75 apps on Google Play and 10 on the Apple App Store have been found to be involved in ad fraud scheme. The most recent attack wave, code-named Scylla…
Critical WhatsApp bugs might have enabled remote device hacking by attackers.
Two WhatsApp bugs for Android and iOS that might allow remote code execution on weak devices have been fixed with security updates. One of these involves WhatsApp’s serious integer overflow vulnerability CVE-2022-36934 (CVSS score: 9.8). This allows arbitrary code to…
Attackers of the BlackCat Ransomware Seen Honing Their Malware Arsenal
In order to remain undetected and widen its scope, the BlackCat ransomware team has been observed perfecting its malware arsenal. Researchers from Symantec noted in a recent report that two noteworthy advancements have been the usage of a new version…
Tibetans are the target of Chinese espionage hackers using the new LOWZERO backdoor.
An advanced persistent threat actor (APTA) with ties to China identified as TA413 used recently discovered security holes in Microsoft Office and Sophos Firewall to launch a never-before-seen backdoor named LOWZERO as part of an espionage campaign against Tibetan groups.…
Java template framework Pebble vulnerable to command injection
The problem still has to be fixed, although there are solutions available. Pebble, a Java templating engine, had a weakness that might let attackers get beyond its security safeguards. Framework Pebble vulnerable can launch command injection attacks against host servers.…
Various sectors’ search engine users are directed to JavaScript malware via SEO poisoning campaigns
The clever operation directs people looking for business templates and forms to websites that are hosting dangerous files. Researchers have found a high-effort SEO poisoning campaign involves workers in various business and governmental sectors. They look up specific terms related…
The Colonial Pipeline ransomware organization has adopted new strategies to increase its danger
According to Symantec, the organization, known as Coreid, has updated its data exfiltration tool and is now providing more sophisticated capabilities to successful affiliates. When Colonial Pipeline ransomware, a firm in charge of distributing oil and gas over the East…
Optus Facing $1 Million Threat of Extortion Following Data Breach
A US$1 million extortion demand has been made against the second-largest telecommunications provider in Australia in an effort to stop the sale of potentially 11.2 million sensitive client details, according to the attacker. The Australian Federal Police is looking into…