Menu

Blog

Archive for the ‘cybercrime/malcode’ category: Page 29

Apr 2, 2023

Trojanized Tor browsers target Russians with crypto-stealing malware

Posted by in categories: cryptocurrencies, cybercrime/malcode

A surge of trojanized Tor Browser installers targets Russians and Eastern Europeans with clipboard-hijacking malware that steals infected users’ cryptocurrency transactions.

Kaspersky analysts warn that while this attack is not new or particularly creative, it’s still effective and prevalent, infecting many users worldwide.

While these malicious Tor installers target countries worldwide, Kaspersky says that most are targeting Russia and Eastern Europe.

Mar 31, 2023

D3dcompiler_47.dll: If AV raises an alerts about this Microsoft signed dll file, you are in trouble

Posted by in categories: cybercrime/malcode, encryption, internet

Threat actors used a well-liked piece of corporate communication software from 3CX, according to security experts. In particular, reports state that a desktop client for the 3CX VoIP (Voice over Internet Protocol) service was used to specifically target 3CX’s clients.

It is believed that the attack is a multi-part process, with the first stage using a hacked version of the 3CX desktop application. Although the.exe file and the MSI package have the same name, preliminary research indicates that the MSI package is the one that may include DLLs that have been maliciously modified.

Continue reading “D3dcompiler_47.dll: If AV raises an alerts about this Microsoft signed dll file, you are in trouble” »

Mar 31, 2023

600,000 companies networks using 3CX VoIP software infected with malware. Biggest supply chain attack

Posted by in categories: cybercrime/malcode, government

Researchers from multiple security companies have reported that a massive supply chain attack on users of 3CX, a widely utilized voice and video calling desktop client, was carried out by computer hackers working on behalf of the government of North Korea. The attack targeted users of the Windows and macOS operating systems. 3CX users may make calls, examine the status of colleagues, chat, plan a video conference, and check voicemails all from the desktop program by using the 3CXDesktopApp, which is accessible for Windows, macOS, Linux, and mobile devices.

The attack resulted in the compromising of the software build system that was used to generate and distribute versions of the app for Windows and macOS. The app delivers VoIP and PBX services to “over 600,000 clients,” some of which include American Express, Mercedes-Benz, and Price Waterhouse Cooper. Since the attackers controlled the software development system, they were able to insert malware into 3CX applications, even though those applications had been digitally signed using the official signing key for the firm.

Continue reading “600,000 companies networks using 3CX VoIP software infected with malware. Biggest supply chain attack” »

Mar 31, 2023

Powered by GPT-4: Microsoft’s new AI Security Copilot to enhance cybersecurity

Posted by in categories: cybercrime/malcode, robotics/AI

According to Microsoft, 1,287 password attacks occur every second around the world.

Microsoft is now focusing on cybersecurity as part of its ongoing efforts to incorporate generative artificial intelligence into the majority of its products. The company previously announced an AI-powered assistant for Office apps.

To enhance cyber security, Microsoft Corp has announced the implementation of the next generation of AI in its security products.

Continue reading “Powered by GPT-4: Microsoft’s new AI Security Copilot to enhance cybersecurity” »

Mar 31, 2023

Supply chain cyberattack with possible links to North Korea could have thousands of victims globally

Posted by in category: cybercrime/malcode

Hackers modified an enterprise communication company’s installation software in an attack that could steal credentials and other information from companies around the world, according to an analysis published Wednesday.

Researchers with cybersecurity firm SentinelOne’s SentinelLabs team traced illicit activity flagged by its detection systems back to the installation software from a company called 3CX, which according to its website provides video conferencing and online communication products to companies such as Toyota, McDonalds, Pepsi and Chevron. In total, the company says it serves some 12 million customers globally.

This sort of large-scale attack that takes advantage of a company’s supply chain — similar to how attackers leveraged a flaw within a SolarWinds product update to install backdoors inside its customers’ networks — can be difficult to defend against and could lead to devastating consequences for victims. It’s also the kind of operation that is typically associated with a nation-state hacking group.

Mar 29, 2023

WiFi protocol flaw allows attackers to hijack network traffic

Posted by in categories: cybercrime/malcode, internet

Cybersecurity researchers have discovered a fundamental security flaw in the design of the IEEE 802.11 WiFi protocol standard, allowing attackers to trick access points into leaking network frames in plaintext form.

WiFi frames are data containers consisting of a header, data payload, and trailer, which include information such as the source and destination MAC address, control, and management data.

These frames are ordered in queues and transmitted in a controlled matter to avoid collisions and to maximize data exchange performance by monitoring the busy/idle states of the receiving points.

Mar 29, 2023

ChatGPT Data Breach Confirmed as Security Firm Warns of Vulnerable Component Exploitation

Posted by in categories: cybercrime/malcode, robotics/AI

One more. I hope it’s not posted yet. Even AI isn’t safe.


ChatGPT creator OpenAI has confirmed a data breach caused by a bug in an open source library, just as a cybersecurity firm noticed that a recently introduced component is affected by an actively exploited vulnerability.

OpenAI said on Friday that it had taken the chatbot offline earlier in the week while it worked with the maintainers of the Redis data platform to patch a flaw that resulted in the exposure of user information.

Continue reading “ChatGPT Data Breach Confirmed as Security Firm Warns of Vulnerable Component Exploitation” »

Mar 28, 2023

Hacking phones remotely without touching via new inaudible ultrasound attack

Posted by in categories: cybercrime/malcode, mobile phones, robotics/AI

The Near–Ultrasound Invisible Trojan, or NUIT, was developed by a team of researchers from the University of Texas at San Antonio and the University of Colorado Colorado Springs as a technique to secretly convey harmful orders to voice assistants on smartphones and smart speakers.

If you watch videos on YouTube on your smart TV, then that television must have a speaker, right? According to Guinevere Chen, associate professor and co-author of the NUIT article, “the sound of NUIT harmful orders will [be] inaudible, and it may attack your mobile phone as well as connect with your Google Assistant or Alexa devices.” “That may also happen in Zooms during meetings. During the meeting, if someone were to unmute themself, they would be able to implant the attack signal that would allow them to hack your phone, which was placed next to your computer.

Continue reading “Hacking phones remotely without touching via new inaudible ultrasound attack” »

Mar 28, 2023

Windows, Ubuntu, and VMWare Workstation hacked on last day of Pwn2Own

Posted by in category: cybercrime/malcode

On the third day of the Pwn2Own hacking contest, security researchers were awarded $185,000 after demonstrating 5 zero-day exploits targeting Windows 11, Ubuntu Desktop, and the VMware Workstation virtualization software.

The highlight of the day was the Ubuntu Desktop operating system getting hacked three times by three different teams, although one of them was a collision with the exploit being previously known.

The three working Ubuntu zero-day were demoed by Kyle Zeng of ASU SEFCOM (a double free bug), Mingi Cho of Theori (a Use-After-Free vulnerability), and Bien Pham (@bienpnn) of Qrious Security.

Mar 26, 2023

Ingenious Photosynthesis “Hack” Paves Way for Renewable Energy Breakthroughs

Posted by in categories: cybercrime/malcode, energy, sustainability

Researchers have ‘hacked’ the earliest stages of photosynthesis, the natural machine that powers the vast majority of life on Earth, and discovered new ways to extract energy from the process, a finding that could lead to new ways of generating clean fuel and renewable energy. We didn’t know as.

Page 29 of 194First2627282930313233Last