Attackers continue to target VMware Horizon servers, which many organizations use to securely access enterprise apps for remote workers. Attackers are exploiting the critical Apache Log4j remote code execution vulnerability that came to the fore in December 2021. Sophos researchers…
Latest posts - Page 67
Malware affects computers with cryptocurrency miners
An unknown threat actor has been employing a “ complex and powerful” malware loader for deploying cryptocurrency miners on affected systems and possibly allowing the theft of Discord tokens. “The evidence found on victim networks appears to indicate that the…
FataIRAT’s new variant used by Purple Fox malware operators
Purple Fox malware operators have expanded their malware arsenal and now possess a new variant of a remote access trojan FataIRAT. Further, at the same time, the operators have improved their evasive capabilities to bypass security software. “Users’ machines are…
Attacks targeting Android and iPhone users for stealing cryptocurrency uncovered
Researchers have uncovered a malicious scheme mainly directed towards Chinese users via fake apps on Android and iOS that resemble genuine digital wallet services to steal cryptocurrency funds. “These malicious apps were able to steal victims’ secret seed phrases by…
Azure developers targeted by more than 200 NPM malicious packages
A new massive supply chain attack targeting Azure developers for stealing personal information has deployed more than 218 malicious NPM packages. “After manually inspecting some of these packages, it became apparent that this was a targeted attack against the entire…
BitRAT Spreads as Windows 10 license activator over the Internet as a cheap and elusive
Analysts from AhnLab, a company specialized in cybersecurity, revealed the spread of a new but already known virus called BitRAT. What is BitRAT? BitRAT, a malware classified as a Remote Access Trojan (RAT) is being distributed to users looking to…
A New Backdoor and a Unique Attack Chain – Slithering Serpent
A new email campaign attacking French entities uses a highly evasive attack chain. The phishing campaign is installing a new backdoor named Serpent. Initial details The sophisticated threat actor is leveraging a unique amalgamation of open-source software, which is a…
Botnet Malware jeopardises over 2,00,000 Mikro Tik routers
Mikro Tik’s vulnerable routers have been used in one of the largest botnet-as-a-service cybercrime, according to cybersecurity researchers. Avast published a new piece of research that states a cryptocurrency mining attack using the new-disrupted Glupteba botnet and the infamous TrickBot…
New Browser-in-the Browser (BITB) Attack Makes Phishing Nearly Undetectable
Can web browsers protect us, even if it is HTTPS? Maybe yes, but not with the novel BitB attack, which fakes us by a popup SSO window to phish the credentials for Google, Facebook, and Microsoft. Before clicking wily-nily on…
Gh0stCringe Targets Weakly Configured Microsoft SQL, MySQL Servers
Researchers have identified that the actors behind the Gh0stCringe remote access trojan are targeting Microsoft SQL and MySQL database servers. Gh0stCringe, which is thought to be active since 2018, is a known variant of Gh0st RAT malware. A recent report…