Category: Malware

  • Maybe Microwaves can be hacked but turn them into cameras? Nah

    In her recent interview with Bergen Record columnist Mike Kelly, the Counselor to the President for Donald Trump Kellyanne Elizabeth Conway stated that there was an article talking about how we can all be spied upon by “microwaves that turn into cameras.” She went on to explain that it is “just a fact of modern life.” Q: Do […]

  • Latest Google Chrome Scam Aims At Stealing Credit Card Data

    Google’s Chrome browser has remained the apple of every hacker’s eyes for more than one reasons, the most important being that it is very commonly used. Therefore, the more visitors on Chrome, the higher will be the number of victims of these hacking and scam campaigns. This is why every other week we notice a […]

  • Wikileaks Vault 7: CIA hacked Smart TVs, Phones, Trucks and Computers

    Wikileaks, the famed whistleblowing platform, recently revealed a lot to the public. Titled Vault 7, Part 1, the documents show a grim view of government surveillance as we know it. Among the disturbing pieces of information was that of the CIA’s efforts to breach the security of Apple’s iPads and iPhones. The Central Intelligence Service […]

  • Meet StoneDrill Malware Destroying Everything on Infected Computers

    The IT security researchers at Kaspersky Labs have discovered a new malware targeting oil and gas companies in the Middle East and also aiming towards targets in Europe. Dubbed StoneDrill by researchers, the malware can evade antivirus detection and destroy everything on an infected device. Kaspersky Labs discovered that StoneDrill is being used in attacks […]

  • South Korean Retail Giant Lotte’s Website Hacked After US Military Deal

    Lotte Group is a multinational corporation having footprints across Asia, Europe and North America. It has headquarters in Seoul, South Korea. Apart from Japan, China is its second major market. Lotte Group started its business operations in China in 1994, and since then it has earned an excellent reputation and following from the Chinese consumers. […]

  • Hackers Using Unmonitored System Tools, Protocols for Malicious Goals

    The IT security researchers at Cisco’s security intelligence and research group Talos have discovered a malware that can fully hide its origins. The sample that the researchers analyzed was utilizing DNS TXT record queries/response for creating a “bidirectional Command and Control channel.” The findings of their research have been published in a report compiled by Edmund Brumaghin and […]

  • Google to Protect Mac Chrome Users with Additional “Safe Browsing” Alerts

    It is a fact that lately, malware attacks against Mac devices are on the rise. Chrome users are being targeted rather continuously even on macOS systems; therefore, Google has now decided to broaden the security measures for macOS devices. The primary objective behind this decision is to ensure that users enjoy well-guarded and safe browsing […]

  • Hundreds of Android Apps on Google Play Store Infected with Windows Malware

    Android apps have always remained an easy target of exploitation primarily because of the high number of Android users across the globe. In the latest research analysis from security firm Palo Alto Networks, it was revealed that around 132 Android apps on Google Play store contain malicious coding. This could be due to the use of infected computers by […]

  • Evolved Version of MongoDB Ransomware Caught Targeting MySQL Databases

    Earlier in January, we heard about MongoDB ransomware that erased data from not hundreds but thousands of computers and forced the victims to pay ransom money. The same MongoDB ransomware is now back in the news but this time, it is even more powerful and the campaign is also quite sophisticated in design. In the recent […]

  • Someone from China is Distributing Mirai Malware Through Windows Botnet

    Mirai malware was discovered in 2016 when it was used the Internet’s largest DDoS attack on DYN DNS and OVH hostings. A couple of weeks ago, it was also discovered that after infecting Linux devices, the Mirai malware is can also infect Windows devices. Now, in a report published by Kaspersky Lab, it was identified […]

  • BitTorrent distribution sites dropping crypto-ransomware on macOS

    Cybercriminals prefer crypto-ransomware as it not only successfully targets Windows desktop but also those devices that run on MacOS or Linux. Now, according to ESET researchers, there is a new ransomware malware called “Patcher” targeting Mac users. The new ransomware is written in Swift and is called Patcher; it is being distributed through BitTorrent distribution […]

  • Chrome Users Beware- Do Not Fall Prey to Missing Font Malware Campaign

    Chrome has remained the eye-candy of cyber-criminals lately and the latest hacking campaign is a clear proof of that. NeoSmart Technologies, a renowned cyber-security firm, has identified the presence of a new hacking campaign using JavaScript to manipulate the text on a compromised WordPress website. This way, the malicious code is disguised and as the […]

  • BugDrop Malware Campaign Obtains Data by Compromising PC Microphones

    CyberX, a security firm has discovered that Ukraine is being targeted with an extensive cyber-reconnaissance operation. In this particular campaign, the targets are quite broad range and the basic purpose is to spy on confidential communications of key Ukrainian officials by remotely controlling PC microphones. Apart from Ukraine, CyberX has identified targets in Russia as well […]

  • TeamSpy malware targeting users through malicious TeamViewer app

    TeamSpy data-stealing malware has been detected again. This time, the malware being used in a new campaign that has been discovered by researchers at Heimdal Security. Through using TeamSpy (Pdf), attackers and threat actors can easily gain access and full control on any compromised computer. A majority of the targets seem to be unsuspecting online users, […]

  • Hackers Selling Undetectable Proton Malware for macOS in 40 BTC

    Hackers are selling a malware for Mac devices on a prominent dark web marketing claiming that it is undetectable and comes with capabilities including taking full control of macOS devices by evading anti-virus detection. Dubbed Proton by its developers, the malware is a RAT (Remote Administration Tool) and is being sold in one of the […]

  • IDF targeted by sophisticated cyber espionage through Android devices

    Israeli members of the armed forces have remained under the radar of cyber spies and espionage actors for a very long time. However, In July last year, over a hundred officials were targeted by malicious cyber-criminals as they managed to compromise their cell phones/tablets and infiltrated data and transferred it to the command and control […]

  • Bangkok Police Arrests Ukrainian Hacker Planning ATM Malware Attack

    Bangkok police have detained an east European man Oleksandr Krachkovskyi who was carrying fake credit cards and the department is citing it as a great victory since they have managed to thwart a bank ATM oriented malware attack. The 31-year-old Ukrainian passport holder Krachkovskyi was caught on Wednesday from a shopping mall situated in Pratunam […]

  • Researchers Discover Yet Another Malware Designed to Compromise Mac Devices

    Bitdefender, renowned IT security/antivirus firm, has identified that the latest strain of Xagent for Mac is being used as a backdoor for intruders. After the malware is installed via Komplex downloader, it looks for a debugger’s presence and if it isn’t found it waits for network connection to be enabled to contact its C&C servers. The attackers then activate […]

  • Someone DDoSed A University Server By Hacking Its Vending Machines

    It is a fact that Internet of Things (IoT) devices are extremely vulnerable to exploitation from malicious threat actors, thanks to the phenomena of default login credentials and widespread availability that makes them easy targets. We have also come to know about the capabilities of even a smaller number of infected IoT devices as they […]