Tag: malware
-
Hacker News: Software developers targeted by malware hidden in Python packages
Source URL: https://www.techradar.com/pro/security/software-developers-targeted-by-malware-hidden-in-python-packages Source: Hacker News Title: Software developers targeted by malware hidden in Python packages Feedly Summary: Comments AI Summary and Description: Yes Summary: The text discusses a series of cyberattacks targeting Python developers by the North Korean hacking group Lazarus, under the guise of fake job advertisements. The attackers exploited Python package repositories…
-
Slashdot: 11 Million Devices Infected With Botnet Malware Hosted In Google Play
Source URL: https://it.slashdot.org/story/24/09/23/213203/11-million-devices-infected-with-botnet-malware-hosted-in-google-play?utm_source=rss1.0mainlinkanon&utm_medium=feed Source: Slashdot Title: 11 Million Devices Infected With Botnet Malware Hosted In Google Play Feedly Summary: AI Summary and Description: Yes Summary: The text discusses the resurgence of malicious behavior in legitimate Android apps, specifically highlighting the discovery of new infections linked to a previously identified malware family. This emphasizes the ongoing…
-
The Register: Necro malware continues to haunt side-loaders of dodgy Android mods
Source URL: https://www.theregister.com/2024/09/23/necro_malware_android/ Source: The Register Title: Necro malware continues to haunt side-loaders of dodgy Android mods Feedly Summary: 11M devices exposed to trojan, Kaspersky says The Necro trojan is once again making a move against Android users, with up to eleven million individuals thought to be exposed to infected apps.… AI Summary and Description:…
-
The Register: Move over, Cobalt Strike. Splinter’s the new post-exploit menace in town
Source URL: https://www.theregister.com/2024/09/23/splinter_red_team_tool/ Source: The Register Title: Move over, Cobalt Strike. Splinter’s the new post-exploit menace in town Feedly Summary: No malware crew linked to this latest red-teaming tool yet Attackers are using Splinter, a new post-exploitation tool, to wreak havoc in victims’ IT environments after initial infiltration, utilizing capabilities such as executing Windows commands,…
-
Krebs on Security: This Windows PowerShell Phish Has Scary Potential
Source URL: https://krebsonsecurity.com/2024/09/this-windows-powershell-phish-has-scary-potential/ Source: Krebs on Security Title: This Windows PowerShell Phish Has Scary Potential Feedly Summary: Many GitHub users this week received a novel phishing email warning of critical security holes in their code. Those who clicked the link for details were asked to distinguish themselves from bots by pressing a combination of keyboard…
-
Schneier on Security: FBI Shuts Down Chinese Botnet
Source URL: https://www.schneier.com/blog/archives/2024/09/fbi-shuts-down-chinese-botnet.html Source: Schneier on Security Title: FBI Shuts Down Chinese Botnet Feedly Summary: The FBI has shut down a botnet run by Chinese hackers: The botnet malware infected a number of different types of internet-connected devices around the world, including home routers, cameras, digital video recorders, and NAS drives. Those devices were used…
-
Cloud Blog: UNC1860 and the Temple of Oats: Iran’s Hidden Hand in Middle Eastern Networks
Source URL: https://cloud.google.com/blog/topics/threat-intelligence/unc1860-iran-middle-eastern-networks/ Source: Cloud Blog Title: UNC1860 and the Temple of Oats: Iran’s Hidden Hand in Middle Eastern Networks Feedly Summary: Written by: Stav Shulman, Matan Mimran, Sarah Bock, Mark Lechtik Executive Summary UNC1860 is a persistent and opportunistic Iranian state-sponsored threat actor that is likely affiliated with Iran’s Ministry of Intelligence and Security…