Tag: malware
-
Hacker News: 1.3M Android-Based TV Boxes Backdoored; Researchers Still Don’t Know How
Source URL: https://arstechnica.com/security/2024/09/researchers-still-dont-know-how-1-3-million-android-streaming-boxes-were-backdoored/ Source: Hacker News Title: 1.3M Android-Based TV Boxes Backdoored; Researchers Still Don’t Know How Feedly Summary: Comments AI Summary and Description: Yes Summary: The text provides an overview of a significant malware infection affecting around 1.3 million streaming devices using an open-source version of Android, which researchers have named Android.Vo1d. This malware…
-
Hacker News: Void captures over a million Android TV boxes
Source URL: https://news.drweb.com/show/?i=14900 Source: Hacker News Title: Void captures over a million Android TV boxes Feedly Summary: Comments AI Summary and Description: Yes Summary: The analysis reveals the existence of malware named Android.Vo1d, which has compromised approximately 1.3 million Android TV boxes globally. This malware employs various tactics to gain root access and ensure persistence,…
-
The Register: ‘Hadooken’ Linux malware targets Oracle WebLogic servers
Source URL: https://www.theregister.com/2024/09/13/hadooken_attacks_oracle_weblogic/ Source: The Register Title: ‘Hadooken’ Linux malware targets Oracle WebLogic servers Feedly Summary: Nastyware seeks creds, mines crypto, and plants ransomware that isnt deployed – for now? An unknown attacker is exploiting weak passwords to break into Oracle WebLogic servers and deploy an emerging Linux malware called Hadooken, according to researchers from…
-
Hacker News: Pixhell Attack: Leaking Info from Air-Gap Computers via ‘Singing Pixels’
Source URL: https://arxiv.org/abs/2409.04930 Source: Hacker News Title: Pixhell Attack: Leaking Info from Air-Gap Computers via ‘Singing Pixels’ Feedly Summary: Comments AI Summary and Description: Yes Summary: The PIXHELL attack exploits air-gapped systems by using sound generated from computer screens to leak sensitive information, circumventing traditional security measures. This paper highlights a novel method for data…
-
Cloud Blog: Insights on Cyber Threats Targeting Users and Enterprises in Mexico
Source URL: https://cloud.google.com/blog/topics/threat-intelligence/cyber-threats-targeting-mexico/ Source: Cloud Blog Title: Insights on Cyber Threats Targeting Users and Enterprises in Mexico Feedly Summary: Written by: Aurora Blum, Kelli Vanderlee Like many countries across the globe, Mexico faces a cyber threat landscape made up of a complex interplay of global and local threats, with threat actors carrying out attempted intrusions…
-
Slashdot: SpyAgent Android Malware Steals Your Crypto Recovery Phrases From Images
Source URL: https://it.slashdot.org/story/24/09/06/220250/spyagent-android-malware-steals-your-crypto-recovery-phrases-from-images?utm_source=rss1.0mainlinkanon&utm_medium=feed Source: Slashdot Title: SpyAgent Android Malware Steals Your Crypto Recovery Phrases From Images Feedly Summary: AI Summary and Description: Yes Summary: The text discusses the SpyAgent Android malware, highlighting its use of optical character recognition (OCR) to steal sensitive cryptocurrency wallet information. Notably targeting South Korea, this malware threatens to extend its…
-
Hacker News: Hacker trap: Fake OnlyFans tool backstabs cybercriminals, steals passwords
Source URL: https://www.bleepingcomputer.com/news/security/hacker-trap-fake-onlyfans-tool-backstabs-cybercriminals-steals-passwords/ Source: Hacker News Title: Hacker trap: Fake OnlyFans tool backstabs cybercriminals, steals passwords Feedly Summary: Comments AI Summary and Description: Yes Summary: This text highlights a unique cyber threat landscape where hackers target each other through deceptive tools, specifically involving the Lumma stealer malware. This situation underscores the complexities of cybercrime where…
-
CSA: How to Bypass EDR Techniques with Reflective Security
Source URL: https://cloudsecurityalliance.org/articles/zero-footprint-attacks-3-steps-to-bypass-edr-with-reflective-loading Source: CSA Title: How to Bypass EDR Techniques with Reflective Security Feedly Summary: AI Summary and Description: Yes Summary: The text discusses advanced EDR (Endpoint Detection and Response) evasion techniques, particularly focusing on “reflective loading” methods that attackers use to circumvent security measures. It provides insights into the risks posed to organizations,…
-
The Register: Novel attack on Windows spotted in phishing campaign run from and targeting China
Source URL: https://www.theregister.com/2024/09/02/securonix_china_slowtempest_campaign/ Source: The Register Title: Novel attack on Windows spotted in phishing campaign run from and targeting China Feedly Summary: Resources hosted at Tencent Cloud involved in Cobalt Strike campaign Chinese web champ Tencent’s cloud is being used by unknown attackers as part of a phishing campaign that aims to achieve persistent network…