Toggle light / dark theme

Security researchers have detailed a new variant of a dynamic link library (DLL) search order hijacking technique that could be used by threat actors to bypass security mechanisms and achieve execution of malicious code on systems running Microsoft Windows 10 and Windows 11.

The approach “leverages executables commonly found in the trusted WinSxS folder and exploits them via the classic DLL search order hijacking technique,” cybersecurity firm Security Joes said in a new report exclusively shared with The Hacker News.

In doing so, it allows adversaries to eliminate the need for elevated privileges when attempting to run nefarious code on a compromised machine as well as introduce potentially vulnerable binaries into the attack chain, as observed in the past.

Tesla unveils Optimus Gen 2, a lighter, faster, and smoother humanoid robot that can assist humans in various tasks.\
https://cyberguy.com/future-tech/next…\
\
For more of my tech tips \& security alerts, subscribe to my free CyberGuy Report Newsletter\
Cyberguy.com/newsletter\
\
Ask Kurt a question or let us know what stories you’d like us to cover\
CyberGuy.com/Contact\
\
***********\
\
Answers to the most asked CyberGuy questions:\
\
● What is the best way to protect your Mac, Windows, iPhone, and Android devices from getting hacked? https://cyberguy.com/software/best-an… \
\
● What is the best way to stay private, secure, and anonymous while browsing the web?\
https://cyberguy.com/privacy/best-vpns/\
\
● How can I get rid of robocalls with apps and data removal services?\
https://cyberguy.com/how-to/how-to-ge…\
\
***********\
\
Related: \
\
Best Antivirus Security Software\
https://cyberguy.com/LockUpYourTech\
\
Best VPNs for Browsing the Internet Privately\
https://cyberguy.com/VPN\
\
How to Back-up your Devices the right way\
https://cyberguy.com/HowoBackupDevices\
\
***********\
\

http://cyberguy.com/newsletter\
\
***********\
\
Follow me here:\
http://www.cyberguy.com\
/ cyberguyofficial \
/ cyberguy \
/ kurtthecyberguy \
\
#TeslaRobot\
#OptimusGen2\
#HumanoidRobotics\
#TechInnovation\
#TechNews\
#TechnologyNews\
#Innovation\
#FutureTech\
\
***\
\
ABOUT CYBERGUY — AMERICA’S TECH AUTHORITY\
\
Kurt \

Poorly secured Linux SSH servers are being targeted by bad actors to install port scanners and dictionary attack tools with the goal of targeting other vulnerable servers and co-opting them into a network to carry out cryptocurrency mining and distributed denial-of-service (DDoS) attacks.

“Threat actors can also choose to install only scanners and sell the breached IP and account credentials on the dark web,” the AhnLab Security Emergency Response Center (ASEC) said in a report on Tuesday.

In these attacks, adversaries try to guess a server’s SSH credentials by running through a list of commonly used combinations of usernames and passwords, a technique called dictionary attack.

Google and Twitter ads are promoting sites containing a cryptocurrency drainer named ‘MS Drainer’ that has already stolen $59 million from 63,210 victims over the past nine months.

According to blockchain threat analysts at ScamSniffer, they discovered over ten thousand phishing websites using the drainer from March 2023 to today, with spikes in the activity observed in May, June, and November.

A drainer is a malicious smart contract or, in this case, a complete phishing suite designed to drain funds from a user’s cryptocurrency wallet without their consent.

Ubisoft reportedly stopped hackers from stealing 900GB of data from the company, including user data from the game Rainbow Six Siege.

The company reportedly discovered the breach 48 hours after the hack, at which point it revoked the hackers’ access before they could remove any data, BleepingComputer reports.

Still, the hackers reportedly were able to access Microsoft Teams conversations, the Ubisoft SharePoint server, and the Confluence and Mongo DB Atlas.