A new malware targeting Amazon Web Services (AWS) Lambda serverless computing platform has been detected. Called “Denonia,” after the name of the domain it communicates with, “the malware uses newer address resolution techniques for command and control traffic to evade…
Latest posts - Page 65
Hive’s New Detection-Eluding Technique is IPfuscation.
The Hive ransomware group has adopted a new obfuscation technique to evade detection. The technique involves IPv4 addresses and a series of conversions leading to the download of the Cobalt Strike Beacon. The Technique of IPfuscation Sentinel Labs researchers discovered…
WhatsApp Voice message Phishing emails spreading software that steals personal information.
A new WhatsApp phishing campaign has been detected, posing as WhatsApp’s voice message function and attempting to deliver malware to at least 27,655 email addresses. The goal of this phishing effort is to lead the recipient through a sequence of…
Researchers reveal Colibri’s modus operandi
Cybersecurity researchers have thoroughly reported a “simple but efficient” persistence method used by a relatively new malware loader called “Colibri.” Colibri has been put to use as a windows information stealer known as Vidar in an attack campaign. “The attack…
North Korean hackers using infected wallet apps to steal crypto
The Lazarus Group, the government-backed North Korean hacking group, has been identified as operating an attack campaign that uses trojanized decentralized finance (DeFi) wallet app to spread a feature-loaded backdoor in affected Windows systems. The app has features to save…
The Cryptomining Attack Campaign of Mars Stealer Targets OpenOffice
Attacks using the popular Mars Stealer have been on the rise, according to researchers. Its popularity grew after the Raccoon Stealer was shut down abruptly, as some attackers turned to it as an alternative. The Campaign Morphisec discovered a scheme…
New Android Spyware Discovered with C2 Server Linked to Turla Hackers
An Android spyware application was discovered that poses a “Process Manager” service to capture sensitive data from afflicted devices. The software, which has the package name “com.remote.app,” establishes communication with a remote command-and-control server, 82.146.35[.]240, which was previously recognized as…
Crypto Phishing Scam carried out as a result of a breach in Mailchimp’s system
On Monday, Mailchimp, an email marketing service, disclosed a data breach that compromised an internal tool, and the tool was used for unauthorised access to customer accounts and to execute phishing attacks. Bleeping Computer was the first to report this…
The Beastmode DDoS Botnet is enslaving extra routers by exploiting new TOTOLINK bugs.
Between February and March 2022, a variant of the Mirai botnet known as Beastmode was observed using recently reported vulnerabilities in TOTOLINK routers to contaminate unpatched units and grow its reach substantially. “The Beastmode Mirai-based DDoS campaign has rapidly updated…
Apple device used for stalking
Police arrested a 19-year-old Tennessee man for stalking his partner using an Apple watch attached to the wheel of the partner’s car. According to an affidavit, Police became aware of the stalking after a security officer at a local family…