Nov 13, 2021
TrickBot Operators Partner with Shathak Attackers for Conti Ransomware
Posted by Saúl Morales Rodriguéz in category: cybercrime/malcode
A team of TrickBot operators joins forces with Shatak attackers to launch Conti Ransomware.
A team of TrickBot operators joins forces with Shatak attackers to launch Conti Ransomware.
Researchers are warning of a new evolving botnet that has been spotted in the wild and has worm-like spreading capabilities to infect Linux systems.
Researchers uncover a new cyber mercenary hacker-for-hire group that has been conducting cyber espionage and data theft since 2015.
Researchers have uncovered details of a watering hole attack carried out via websites in Hong Kong, and exploited a zero-day vulnerability in macOS.
Meet Artemis Security, the company breaking ground in the realm of security for Israelis, from homes to hospitals.
Many of the malware campaigns we have detected over the last year have been global at scale, targeting anyone with little regard to their location. Recently, we discovered and began monitoring the activity behind PhoneSpy, a spyware aimed at South Korean residents with Android devices. With more than a thousand South Korean victims, the malicious group behind this invasive campaign has had access to all the data, communications, and services on their devices.
Unlike other spyware campaigns we have covered that take advantage of vulnerabilities on the device, PhoneSpy hides in plain sight, disguising itself as a regular application with purposes ranging from learning Yoga to watching TV and videos, or browsing photos. But in reality, the application is stealing data, messages, images, and remote control of Android phones. The data stolen from victim devices ranged from personal photos to corporate communications. The victims were broadcasting their private information to the malicious actors with zero indication that something was amiss.
While the victims have been limited to South Korea, PhoneSpy is an example of how malicious applications can disguise their true intent. When installed on victims’ devices, they leave personal and corporate data at risk. With mobile devices playing critical roles in distributed and remote work, it is no surprise that spyware campaigns like PhoneSpy are on the rise.
Fighting ransomware with bounties.
In May, a ransomware attack shut down a pipeline carrying 45 percent of the fuel used on the US East Coast. The Colonial Pipeline incident led to panic buying and heightened fears about the threat posed by simple hacks to national infrastructure. Now, the US State Department is offering a bounty of up to $10 million to anyone who can supply the “identity or location” of the leaders of the group responsible — an outfit known as DarkSide.
In addition to the $10 million bounty, the state department is offering a reward of up to $5 million for information leading to the arrest or conviction “of any individual conspiring to participate in or attempting to participate in a DarkSide variant ransomware incident.” What exactly that means isn’t clear. Is a “DarkSide variant ransomware incident” one that involves the group’s hacking tools? What if the software has been altered slightly? It seems deliberately ambiguous, allowing the State Department to cast as wide a net as possible.
A DDoS attack essentially tries to down a website or internet service by bombarding the system with a flood of data traffic. To do so, the hacker can sometimes harness botnets, or armies of malware-infected computers, to generate the traffic.
In this case, the attack originated from “70,000 sources” based in countries across Asia and the US, Microsoft says. Whether the hacker used a botnet was left unsaid. But the UDP protocol was exploited in what’s known as a “reflection attack” to amplify the data traffic to 2.4Tbps.
World-renowned science author Yuval Noah Harari said that someday human brains could be hacked into if emerging AI systems are not properly regulated.
World-renowned science author Yuval Noah Harari said that someday human brains could be hacked into if emerging AI systems are not properly regulated.
Critical RCE Vulnerability Reported in Linux Kernel’s Transparent Inter Process Communication (TIPC) module.
Cybersecurity researchers have disclosed a security flaw in the Linux Kernel’s Transparent Inter Process Communication (TIPC) module that could potentially be leveraged both locally as well as remotely to execute arbitrary code within the kernel and take control of vulnerable machines.