cybercrime/malcode – Lifeboat News: The Blog https://lifeboat.com/blog Safeguarding Humanity Sun, 12 Jan 2025 12:04:08 +0000 en-US hourly 1 https://wordpress.org/?v=6.7.1 Chinese hackers target US Treasury computers used for sanctions — Committee on Foreign Investment specifically targeted https://lifeboat.com/blog/2025/01/chinese-hackers-target-us-treasury-computers-used-for-sanctions-committee-on-foreign-investment-specifically-targeted https://lifeboat.com/blog/2025/01/chinese-hackers-target-us-treasury-computers-used-for-sanctions-committee-on-foreign-investment-specifically-targeted#respond Sun, 12 Jan 2025 12:04:08 +0000 https://lifeboat.com/blog/2025/01/chinese-hackers-target-us-treasury-computers-used-for-sanctions-committee-on-foreign-investment-specifically-targeted

No secret information was stolen.

]]>
https://lifeboat.com/blog/2025/01/chinese-hackers-target-us-treasury-computers-used-for-sanctions-committee-on-foreign-investment-specifically-targeted/feed 0
Innovation, Automation, And The Cybersecurity Challenges Ahead https://lifeboat.com/blog/2025/01/innovation-automation-and-the-cybersecurity-challenges-ahead https://lifeboat.com/blog/2025/01/innovation-automation-and-the-cybersecurity-challenges-ahead#respond Sun, 12 Jan 2025 02:28:44 +0000 https://lifeboat.com/blog/2025/01/innovation-automation-and-the-cybersecurity-challenges-ahead

The rapid evolution of artificial intelligence is transforming cybersecurity, offering unprecedented opportunities to defend against increasingly complex and automated threats. AI is no longer a support tool—it’s emerging as a central pillar of modern security strategies. From detecting anomalies and automating threat responses to augmenting security teams, AI is enabling defenders to act faster, scale their operations, and outpace attackers. However, as the technology advances, significant challenges remain, from adversarial AI to the cultural inertia of legacy systems.

Tomer Weingarten, CEO of SentinelOne, and Richard Stiennon, research analyst with IT-Harvest and author of Security Yearbook 2024, both highlight the potential—and limitations—of AI in cybersecurity. “It’s very early days for AI in security,” says Stiennon. “I have found 84 startups with various AI agents or which hope to deploy guardrails to protect companies from mishandling of data by users of AI. It’s way too early to say that any of them are having an impact on the ecosystem. That said, the future is clear. AI will be part of every cyber defense position.”

Weingarten echoes this sentiment, noting that AI’s role is rapidly expanding but far from mature. “AI is no longer just about supporting cybersecurity—it’s fundamentally changing how we secure systems, anticipate threats, and automate responses,” he explains.

]]>
https://lifeboat.com/blog/2025/01/innovation-automation-and-the-cybersecurity-challenges-ahead/feed 0
Mirai Botnet Variant Exploits Four-Faith Router Vulnerability for DDoS Attacks https://lifeboat.com/blog/2025/01/mirai-botnet-variant-exploits-four-faith-router-vulnerability-for-ddos-attacks https://lifeboat.com/blog/2025/01/mirai-botnet-variant-exploits-four-faith-router-vulnerability-for-ddos-attacks#respond Thu, 09 Jan 2025 09:29:19 +0000 https://lifeboat.com/blog/2025/01/mirai-botnet-variant-exploits-four-faith-router-vulnerability-for-ddos-attacks

A Mirai botnet variant has been found exploiting a newly disclosed security flaw impacting Four-Faith industrial routers since early November 2024 with the goal of conducting distributed denial-of-service (DDoS) attacks.

The botnet maintains approximately 15,000 daily active IP addresses, with the infections primarily scattered across China, Iran, Russia, Turkey, and the United States.

Exploiting an arsenal of over 20 known security vulnerabilities and weak Telnet credentials for initial access, the malware is known to have been active since February 2024. The botnet has been dubbed “gayfemboy” in reference to the offensive term present in the source code.

]]>
https://lifeboat.com/blog/2025/01/mirai-botnet-variant-exploits-four-faith-router-vulnerability-for-ddos-attacks/feed 0
Researchers Expose NonEuclid RAT Using UAC Bypass and AMSI Evasion Techniques https://lifeboat.com/blog/2025/01/researchers-expose-noneuclid-rat-using-uac-bypass-and-amsi-evasion-techniques https://lifeboat.com/blog/2025/01/researchers-expose-noneuclid-rat-using-uac-bypass-and-amsi-evasion-techniques#respond Thu, 09 Jan 2025 09:29:09 +0000 https://lifeboat.com/blog/2025/01/researchers-expose-noneuclid-rat-using-uac-bypass-and-amsi-evasion-techniques

NonEuclid RAT: C# malware offering remote access, antivirus bypass, and ransomware, active since November 2024.

]]>
https://lifeboat.com/blog/2025/01/researchers-expose-noneuclid-rat-using-uac-bypass-and-amsi-evasion-techniques/feed 0
Neglected Domains Used in Malspam to Evade SPF and DMARC Security Protections https://lifeboat.com/blog/2025/01/neglected-domains-used-in-malspam-to-evade-spf-and-dmarc-security-protections https://lifeboat.com/blog/2025/01/neglected-domains-used-in-malspam-to-evade-spf-and-dmarc-security-protections#respond Thu, 09 Jan 2025 09:28:55 +0000 https://lifeboat.com/blog/2025/01/neglected-domains-used-in-malspam-to-evade-spf-and-dmarc-security-protections

Cybersecurity researchers have found that bad actors are continuing to have success by spoofing sender email addresses as part of various malspam campaigns.

Faking the sender address of an email is widely seen as an attempt to make the digital missive more legitimate and get past security mechanisms that could otherwise flag it as malicious.

While there are safeguards such as DomainKeys Identified Mail (DKIM), Domain-based Message Authentication, Reporting and Conformance (DMARC), and Sender Policy Framework (SPF) that can be used to prevent spammers from spoofing well-known domains, such measures have increasingly led them to leverage old, neglected domains in their operations.

]]>
https://lifeboat.com/blog/2025/01/neglected-domains-used-in-malspam-to-evade-spf-and-dmarc-security-protections/feed 0
New EAGERBEE Variant Targets ISPs and Governments with Advanced Backdoor Capabilities https://lifeboat.com/blog/2025/01/new-eagerbee-variant-targets-isps-and-governments-with-advanced-backdoor-capabilities https://lifeboat.com/blog/2025/01/new-eagerbee-variant-targets-isps-and-governments-with-advanced-backdoor-capabilities#respond Wed, 08 Jan 2025 08:36:11 +0000 https://lifeboat.com/blog/2025/01/new-eagerbee-variant-targets-isps-and-governments-with-advanced-backdoor-capabilities

Internet service providers (ISPs) and governmental entities in the Middle East have been targeted using an updated variant of the EAGERBEE malware framework.

The new variant of EAGERBEE (aka Thumtais) comes fitted with various components that allow the backdoor to deploy additional payloads, enumerate file systems, and execute commands shells, demonstrating a significant evolution.

“The key plugins can be categorized in terms of their functionality into the following groups: Plugin Orchestrator, File System Manipulation, Remote Access Manager, Process Exploration, Network Connection Listing, and Service Management,” Kaspersky researchers Saurabh Sharma and Vasily Berdnikov said in an analysis.

]]>
https://lifeboat.com/blog/2025/01/new-eagerbee-variant-targets-isps-and-governments-with-advanced-backdoor-capabilities/feed 0
CISA: No Wider Federal Impact from Treasury Cyber Attack, Investigation Ongoing https://lifeboat.com/blog/2025/01/cisa-no-wider-federal-impact-from-treasury-cyber-attack-investigation-ongoing https://lifeboat.com/blog/2025/01/cisa-no-wider-federal-impact-from-treasury-cyber-attack-investigation-ongoing#respond Wed, 08 Jan 2025 08:36:00 +0000 https://lifeboat.com/blog/2025/01/cisa-no-wider-federal-impact-from-treasury-cyber-attack-investigation-ongoing

Chinese hackers exploited BeyondTrust API keys in a major Treasury cyberattack; CISA confirms no wider federal impact.

]]>
https://lifeboat.com/blog/2025/01/cisa-no-wider-federal-impact-from-treasury-cyber-attack-investigation-ongoing/feed 0
Researchers Uncover Major Security Flaw in Illumina iSeq 100 DNA Sequencers https://lifeboat.com/blog/2025/01/researchers-uncover-major-security-flaw-in-illumina-iseq-100-dna-sequencers https://lifeboat.com/blog/2025/01/researchers-uncover-major-security-flaw-in-illumina-iseq-100-dna-sequencers#respond Wed, 08 Jan 2025 08:35:34 +0000 https://lifeboat.com/blog/2025/01/researchers-uncover-major-security-flaw-in-illumina-iseq-100-dna-sequencers

Outdated BIOS firmware in Illumina iSeq 100 allows attackers to disable devices or install malware, threatening critical genetic research and vaccine.

]]>
https://lifeboat.com/blog/2025/01/researchers-uncover-major-security-flaw-in-illumina-iseq-100-dna-sequencers/feed 0
Quantum Leap: D-Wave’s Bold New Move! Discover the Future of Computing https://lifeboat.com/blog/2025/01/quantum-leap-d-waves-bold-new-move-discover-the-future-of-computing https://lifeboat.com/blog/2025/01/quantum-leap-d-waves-bold-new-move-discover-the-future-of-computing#respond Sun, 05 Jan 2025 18:29:41 +0000 https://lifeboat.com/blog/2025/01/quantum-leap-d-waves-bold-new-move-discover-the-future-of-computing

In a groundbreaking development poised to reshape the landscape of quantum computing, D-Wave Systems has announced their latest innovation: the Advantage2 quantum processor. As the industry grapples with an ever-increasing demand for computational power, this announcement signals a pivotal moment in the quest to harness the full potential of quantum technology.

Game-Changing Technology The Advantage2 processor boasts a staggering 7,000 qubits, significantly surpassing its predecessors and setting a new benchmark for quantum performance. This advancement is expected to enhance quantum annealing processes, thereby accelerating solutions for complex optimization problems that classical computers struggle to handle efficiently.

Pioneering Quantum Real-World Applications D-Wave is focusing on addressing real-world challenges across various sectors, including logistics, pharmaceuticals, and cybersecurity. By providing unparalleled computing speed, the Advantage2 aims to facilitate breakthroughs in drug discovery and materials design, and to optimize intricate supply chain networks with unprecedented efficiency.

]]>
https://lifeboat.com/blog/2025/01/quantum-leap-d-waves-bold-new-move-discover-the-future-of-computing/feed 0
PLAYFULGHOST Delivered via Phishing and SEO Poisoning in Trojanized VPN Apps https://lifeboat.com/blog/2025/01/playfulghost-delivered-via-phishing-and-seo-poisoning-in-trojanized-vpn-apps https://lifeboat.com/blog/2025/01/playfulghost-delivered-via-phishing-and-seo-poisoning-in-trojanized-vpn-apps#respond Sat, 04 Jan 2025 12:28:21 +0000 https://lifeboat.com/blog/2025/01/playfulghost-delivered-via-phishing-and-seo-poisoning-in-trojanized-vpn-apps

PLAYFULGHOST malware mimics Gh0st RAT with advanced spyware features, targeting users via phishing and SEO poisoning techniques.

]]>
https://lifeboat.com/blog/2025/01/playfulghost-delivered-via-phishing-and-seo-poisoning-in-trojanized-vpn-apps/feed 0