fbpx

February 2024

Raspberry Robin Malware Upgrades with Discord Spread and New Exploits

Raspberry Robin Malware Upgrades with Discord Spread and New Exploits

The operators of Raspberry Robin are now using two new one-day exploits to achieve local privilege escalation, even as the malware continues to be refined and improved to make it stealthier than before. This means that “Raspberry Robin has access to an exploit seller or its authors develop the exploits themselves in a short period […]

Raspberry Robin Malware Upgrades with Discord Spread and New Exploits Read More »

New Rust-Based macOS Backdoor Steals Files, Linked to Ransomware Groups

New Rust-Based macOS Backdoor Steals Files, Linked to Ransomware Groups

The Trojan.MAC.RustDoor backdoor is potentially linked to the notorious BlackBasta and (ALPHV/BlackCat) ransomware operators. Bitdefender researchers have discovered a new backdoor targeting macOS devices. The backdoor, dubbed, Trojan.MAC.RustDoor is written in Rust language and can steal specific files, archive them, and upload them to the C2 (command and control) server. According to the researchers, the

New Rust-Based macOS Backdoor Steals Files, Linked to Ransomware Groups Read More »

3 million smart toothbrushes were not used in a DDoS attack after all, but it could happen

3 million smart toothbrushes were not used in a DDoS attack after all, but it could happen

3 million smart toothbrushes were not used in a DDoS attack after all, but it could happen It sounds more like science fiction than reality, but Swiss newspaper Aargauer Zeitung reported that approximately three million smart toothbrushes were hijacked by hackers to launch a Distributed Denial of Service (DDoS) attack. These innocuous bathroom gadgets —

3 million smart toothbrushes were not used in a DDoS attack after all, but it could happen Read More »

Cyber-attacks by North Korea raked in $3bn to build nuclear weapons, UN monitors suspect

Cyber-attacks by North Korea raked in $3bn to build nuclear weapons, UN monitors suspect

UN sanctions monitors are investigating dozens of suspected cyber-attacks by North Korea that raked in $3bn to help it further develop its nuclear weapons programme, according to excerpts of an unpublished UN report reviewed by the Reuters news agency. “The Democratic People’s Republic of Korea (DPRK) continued to flout security council sanctions,” a panel of

Cyber-attacks by North Korea raked in $3bn to build nuclear weapons, UN monitors suspect Read More »

3 million smart toothbrushes were just used in a DDoS attack. Really

3 million smart toothbrushes were just used in a DDoS attack. Really

3 million smart toothbrushes were just used in a DDoS attack. Really It sounds more like science fiction than reality, but Swiss newspaper Aargauer Zeitung reports that approximately three million smart toothbrushes were hijacked by hackers to launch a Distributed Denial of Service (DDoS) attack. These innocuous bathroom gadgets — transformed into soldiers in a

3 million smart toothbrushes were just used in a DDoS attack. Really Read More »

U.S. Treasury Imposes Sanctions on Alleged ISIS Cybersecurity Experts

U.S. Treasury Imposes Sanctions on Alleged ISIS Cybersecurity Experts

The FBI is offering a $20,000 reward for anyone providing information to the agency regarding the whereabouts of cybersecurity expert Mu’min Al-Mawji Mahmud Salim, also known as ‘Taqni al-Mujahedeen’. The US Treasury Department announced sanctions today against two Egyptian nationals, Mu’min Al-Mawji Mahmud Salim (alias “Taqni al-Mujahedeen”) and Sarah Jamal Muhammad Al-Sayyid, for allegedly running

U.S. Treasury Imposes Sanctions on Alleged ISIS Cybersecurity Experts Read More »

Free ransomware recovery tool White Phoenix now has a web version - Help Net Security

Free ransomware recovery tool White Phoenix now has a web version – Help Net Security

Free ransomware recovery tool White Phoenix now has a web version White Phoenix is a free ransomware recovery tool for situations where files are encrypted with intermittent encryption. It was tested on BlackCat/ALPHV Ransomware, Play Ransomware, Qilin/Agenda Ransomware, BianLian Ransomware, and DarkBit. Intermittent encryption occurs when ransomware chooses not to encrypt every part of each

Free ransomware recovery tool White Phoenix now has a web version – Help Net Security Read More »

Telegram Marketplaces Fuel Phishing Attacks with Easy-to-Use Kits and Malware

Telegram Marketplaces Fuel Phishing Attacks with Easy-to-Use Kits and Malware

Cybersecurity researchers are calling attention to the “democratization” of the phishing ecosystem owing to the emergence of Telegram as an epicenter for cybercrime, enabling threat actors to mount a mass attack for as little as $230. “This messaging app has transformed into a bustling hub where seasoned cybercriminals and newcomers alike exchange illicit tools and

Telegram Marketplaces Fuel Phishing Attacks with Easy-to-Use Kits and Malware Read More »

Daily Mirror faces £2m in legal costs over Prince Harry phone hacking

Daily Mirror faces £2m in legal costs over Prince Harry phone hacking

The Daily Mirror is facing a claim for almost £2m in legal costs after Prince Harry won substantial damages in his phone-hacking case against the publisher. Mr Justice Fancourt ruled at the high court last month that “extensive” phone hacking took place at Mirror Group Newspapers (MGN) from 2006 to 2011, “even to some extent”

Daily Mirror faces £2m in legal costs over Prince Harry phone hacking Read More »

Scroll to Top