Menu

Blog

Archive for the ‘cybercrime/malcode’ category: Page 122

Mar 17, 2021

Abel Prize celebrates union of mathematics and computer science

Posted by in categories: cybercrime/malcode, internet, mathematics, science

Hungarian mathematician László Lovász and Israeli computer scientist Avi Wigderson will share the prize, worth 7.5 million Norwegian kroner (US$886000), “for their foundational contributions to theoretical computer science and discrete mathematics, and their leading role in shaping them into central fields of modern mathematics”, the Norwegian Academy of Science and Letters announced on 17 March.


The work of winners László Lovász and Avi Wigderson underpins applications from Internet security to the study of networks.

Mar 16, 2021

Hackers Are Already Stealing NFTs

Posted by in category: cybercrime/malcode

But the site’s cybersecurity measures appear to be lacking.

Several other Nifty Gateway users reported that their accounts had been hacked. “My entire account was just hacked and the person who got in wasn’t even booted after changing my password?!” one user wrote in a tweet.

According to a Nifty spokesperson who spoke to Motherboard, the company was aware of the fraudulent activity. The company claims the affected users didn’t have two-factor authentication turned on and that “access was obtained via valid account credentials.”

Mar 15, 2021

Researchers Spotted Malware Written in Nim Programming Language

Posted by in category: cybercrime/malcode

Cybersecurity researchers have unwrapped an “interesting email campaign” undertaken by a threat actor that has taken to distributing a new malware written in Nim programming language.

Dubbed “NimzaLoader” by Proofpoint researchers, the development marks one of the rare instances of Nim malware discovered in the threat landscape.

“Malware developers may choose to use a rare programming language to avoid detection, as reverse engineers may not be familiar with Nim’s implementation, or focused on developing detection for it, and therefore tools and sandboxes may struggle to analyze samples of it,” the researchers said.

Mar 12, 2021

Hackers Are Targeting Microsoft Exchange Servers With Ransomware

Posted by in category: cybercrime/malcode

It didn’t take long. Intelligence agencies and cybersecurity researchers had been warning that unpatched Exchange Servers could open the pathway for ransomware infections in the wake of swift escalation of the attacks since last week.

Now it appears that threat actors have caught up.

According to the latest reports, cybercriminals are leveraging the heavily exploited ProxyLogon Exchange Server flaws to install a new strain of ransomware called “DearCry.”

Mar 11, 2021

Hack of ‘150,000 cameras’ investigated

Posted by in categories: biotech/medical, business, cybercrime/malcode

The hack exposed feeds showing the insides of offices, hospitals and businesses, including Tesla.

Mar 8, 2021

Malware Can Exploit New Flaw in Intel CPUs to Launch Side-Channel Attacks

Posted by in category: cybercrime/malcode

Researchers exploit ring interconnect to develop new side-channel attacks on intel cpus.

Mar 8, 2021

SN4KE: A lightweight and scalable framework for binary mutation testing

Posted by in category: cybercrime/malcode

When developers deliver software to their clients, they often also provide what is known as a ‘test suite.’ A test suite is a tool that allows users to test software, unveil any bugs it might have and give developers a chance to fix these bugs or other potential issues.

In addition to evaluating , therefore, developers also need to ascertain the efficacy of a suite in identifying bugs and errors. One way to run test suite evaluations is via , a technique that generates several ‘mutants’ of a program by slightly modifying its original code. While mutation testing tools have proved to be incredibly helpful, most of them cannot be applied to software that is only available in binary code (a way of representing texts or instructions for computers using two symbols, generally ‘0’ and ‘1’).

Researchers at Arizona State University, Worcester Polytechnic Institute and the University of Minnesota have recently developed SN4KE, a framework that can be used to carry out mutation analyses at a binary level. This framework, presented at the Binary Analysis Research (BAR) NDSS symposium ‘21 in February, is a new tool to efficiently test suites for software based on binary codes.

Mar 8, 2021

A new type of supply-chain attack with serious consequences is flourishing

Posted by in categories: cybercrime/malcode, robotics/AI, transportation

A new type of supply chain attack unveiled last month is targeting more and more companies, with new rounds this week taking aim at Microsoft, Amazon, Slack, Lyft, Zillow, and an unknown number of others. In weeks past, Apple, Microsoft, Tesla, and 32 other companies were targeted by a similar attack that allowed a security researcher to execute unauthorized code inside their networks.

The latest attack against Microsoft was also carried out as a proof-of-concept by a researcher. Attacks targeting Amazon, Slack, Lyft, and Zillow, by contrast, were malicious, but it’s not clear if they succeeded in executing the malware inside their networks. The npm and PyPi open source code repositories, meanwhile, have been flooded with more than 5000 proof-of-concept packages, according to Sonatype, a firm that helps customers secure the applications they develop.

“Given the daily volume of suspicious npm packages being picked up by Sonatype’s automated malware detection systems, we only expect this trend to increase, with adversaries abusing dependency confusion to conduct even more sinister activities,” Sonatype researcher Ax Sharma wrote earlier this week.

Mar 8, 2021

Twistoptics: A New, Efficient Way to Control Optical Nonlinearity

Posted by in categories: biotech/medical, chemistry, cybercrime/malcode, engineering, quantum physics, solar power

Columbia researchers engineer first technique to exploit the tunable symmetry of 2D materials for nonlinear optical applications, including laser, optical spectroscopy, imaging, and metrology systems, as well as next-generation optical quantum information processing and computing.

Nonlinear optics, a study of how light interacts with matter, is critical to many photonic applications, from the green laser pointers we’re all familiar with to intense broadband (white) light sources for quantum photonics that enable optical quantum computing, super-resolution imaging, optical sensing and ranging, and more. Through nonlinear optics, researchers are discovering new ways to use light, from getting a closer look at ultrafast processes in physics, biology, and chemistry to enhancing communication and navigation, solar energy harvesting, medical testing, and cybersecurity.

Columbia Engineering researchers report that they developed a new, efficient way to modulate and enhance an important type of nonlinear optical process: optical second harmonic generation — where two input photons are combined in the material to produce one photon with twice the energy — from hexagonal boron nitride through micromechanical rotation and multilayer stacking. The study was published online on March 32021, by Science Advances.

Mar 8, 2021

Researchers Find 3 New Malware Strains Used by SolarWinds Hackers

Posted by in category: cybercrime/malcode

FireEye and Microsoft on Thursday said they discovered three more malware strains in connection with the SolarWinds supply-chain attack, including a “sophisticated second-stage backdoor,” as the investigation into the sprawling espionage campaign continues to yield fresh clues about the threat actor’s tactics and techniques.

Dubbed GoldMax (aka SUNSHUTTLE), GoldFinder, and Sibot, the new set of malware adds to a growing list of malicious tools such as Sunspot, Sunburst (or Solorigate), Teardrop, and Raindrop that were stealthily delivered to enterprise networks by alleged Russian operatives.