đš Korean hacking group Lazarus Group targets defense industry and nuclear engineers with fake job interviews, using trojanized VNC apps to steal data and execute commands.
Category: cybercrime/malcode – Page 45
âEtherhidingâ Blockchain Technique Hides Malicious Code in WordPress Sites: https://informatech.co/3S3tw
A threat actor has been abusing proprietary blockchain technology to hide malicious code in a campaign that uses fake browser updates to spread various malware, including the infostealers RedLine, Amadey, and Lumma.
While abuse of blockchain is typically seen in attacks aimed at stealing cryptocurrency â as the security technology is best known for protecting these transactions â EtherHiding demonstrates how attackers can leverage it for other types of malicious activity.
Researchers from Guardio have been tracking a campaign dubbed ClearFake over the last two months in which users are misled into downloading malicious fake browser updates from at least 30 highjacked WordPress sites.
After sifting through more than 1.8 million pages identified as admin portals, researchers made a disheartening discovery â 40,000 of them used âadminâ as its password, making it the most popular credential used by IT administrators.
The research was conducted on 2023 passwords between January and September by a team with Outpost24, which also found an increased reliance on default passwords.
The top 10 passwords discovered by the analysis included common defaults and easy-to-guess options:
The digital realm, while offering boundless possibilities, is also a fertile ground for myriad cybersecurity threats. One such peril that has recently come to light is the User-After-Free vulnerability in Google Chrome, specifically identified as CVE-2023â5218. This vulnerability not only poses a significant threat to user data and system integrity but also opens a Pandoraâs box of potential cyber-attacks and exploitations.
The User-After-Free vulnerability is a type of cybersecurity flaw that surfaces when a program continues to utilize memory space after it has been freed or deleted. This flaw allows attackers to execute arbitrary code or potentially gain unauthorized access to a system. CVE-2023â5218, identified within Google Chrome, was noted to be potentially exploitable to perform such malicious actions, thereby putting usersâ data and privacy at substantial risk.
CVE-2023â5218 was unveiled to the public through various cybersecurity platforms and researchers who detected unusual activities and potential exploitation trails leading back to this particular flaw. This vulnerability was identified to be present in a specific Chrome component, prompting Google to release a flurry of updates and patches to mitigate the associated risks.
In the intricate landscape of global cybersecurity, Webwyrm malware has surfaced as a formidable adversary, casting its ominous shadow across 50 nations and leaving in its wake over 100,000 compromised victims. This insidious digital menace successfully emulates in excess of 1,000 reputable companies globally, with the ensuing potential financial fallout estimated to surpass a staggering $100 million. It is imperative for cybersecurity professionals and organizations alike to comprehend the multifaceted nature of this threat to devise and implement robust defensive strategies effectively.
In the dynamic realm of cyber threats, malicious actors incessantly refine their Tactics, Techniques, and Procedures (TTPs), exploiting extant vulnerabilities and augmenting the efficacy of their malicious campaigns. Webwyrm epitomizes this relentless pursuit of evolution, embodying a level of sophistication reminiscent of infamous cyber threats of yore, such as the notorious âBlue Whale Challenge.â
WebWyrm malware orchestrates a complex, deceptive narrative aimed at duping unsuspecting job seekers into relinquishing their cryptocurrency. Initiating contact predominantly via WhatsApp, the malefactors likely leverage data procured from employment portals to pinpoint and engage individuals predisposed to their deceptive overtures. Prospective victims are enticed with promises of lucrative weekly remuneration, ranging between $1200 and $1500, contingent upon the completion of daily task âpacketsâ or âresets.â
Where reliability matters, as it does in energy, resilience against cyberattacks enhances a companyâs reputation. Disruptions damage that reputation.
In 2021, a ransomware attack shut down Colonial Pipeline operations for six days. Gas shortages in the eastern US, economic turmoil, and eye-catching headlines resulted. Interest in cybersecurity for critical infrastructure intensified â and many leaders seemed to learn the wrong lesson.
Energy sector leaders often take cyber vulnerabilities seriously only after a significant breach. Experiencing a loss (or watching someone elseâs) makes companies tighten cybersecurity to avoid similar losses. This pattern emphasizes the loss-avoidance aspects of cybersecurity. Yet thinking of cybersecurity solely as loss avoidance misses a key value generator cybersecurity provides: trust.
Companies that get cybersecurity right earn trust. That trust matters in two ways: It supports brand or company reputation, and it allows for forward innovation.
The researchers tested their algorithm on a replica of a US Army combat ground vehicle and found it was 99% effective in preventing a malicious attack.
Australian researchers have developed an artificial intelligence algorithm to detect and stop a cyberattack on a military robot in seconds.
The research was conducted by Professor Anthony Finn from the University of South Australia (UniSA) and Dr Fendy Santoso from Charles Sturt University in collaboration with the US Army Futures Command. They simulated a MitM attack on a GVT-BOT ground vehicle and trained its operating system to respond to it, according to the press release.
According to Professor Finn, an autonomous systems researcher at UniSA, the robot operating system (ROS) is prone to cyberattacks because it is highly networked. He explained that Industry 4, characterized by advancements in robotics, automation, and the Internet of Things, requires robots to work together, where sensors, actuators, and controllers communicate and share information via cloud services. He added that this makes them very vulnerable to cyberattacks. He also said that computing power is increasing exponentially every few years, enabling them to develop and implement sophisticated AI algorithms to protect systems from digital threats.
The tech giant is following Uber and eBayâs lead in ditching passwords and could have the greatest impact in making it happen.
The death of passwords is imminent and Google has taken a giant step in ensuring it by suggesting users switch to an easier option â passkeys. Starting immediately, Google users will be able to create passkeys and use them to sign in to their accounts, avoiding passwords when possible, the company said in a recent blog post.
Since the advent of the internet passwords have been the most hated component of the entire experience. Early on, users could get away with using simpler combinations of letters and numbers but as cybersecurity risks grew, passwords started becoming longer, tougher, and harder to remember.
SQL Injection is still popular, but attackers are now leaning towards Traversal techniques!
Fastlyâs Network Effect Threat Report sheds light on the latest attack traffic patterns & tactics.
Read:
Dive into the world of cyber threats with our Network Effect Threat Report. Learn about multi-customer attacks and which industries are most targeted.
đš Beware! DarkGate #malware is now spreading through instant messaging apps like Skype & #Microsoft Teams. Stay cautious and donât open suspicious documents!