Menu

Blog

Archive for the ‘cybercrime/malcode’ category: Page 6

Sep 23, 2024

New PondRAT Malware Hidden in Python Packages Targets Software Developers

Posted by in category: cybercrime/malcode

North Korean hackers use poisoned Python packages from PyPI to spread PondRAT malware, targeting developers in a supply chain attack.

Sep 23, 2024

Global infostealer malware operation targets crypto users, gamers

Posted by in categories: cryptocurrencies, cybercrime/malcode, finance

A massive infostealer malware operation encompassing thirty campaigns targeting a broad spectrum of demographics and system platforms has been uncovered, attributed to a cybercriminal group named “Marko Polo.”

The threat actors use a variety of distribution channels, including malvertising, spearphishing, and brand impersonation in online gaming, cryptocurrency, and software, to spread 50 malware payloads, including AMOS, Stealc, and Rhadamanthys.

According to Recorded Future’s Insikt Group, which has been tracking the Marko Polo operation, the malware campaign has impacted thousands, with potential financial losses in the millions.

Sep 23, 2024

Dell investigates data breach claims after hacker leaks employee info

Posted by in category: cybercrime/malcode

Dell has confirmed to BleepingComputer that they are investigating recent claims that it suffered a data breach after a threat actor leaked the data for over 10,000 employees.

The allegations were published yesterday by a threat actor named “grep,” who alleges that the computing vendor suffered a “minor data breach” in September 2024, exposing internal employee and partner information.

In a post to a hacking forum, the threat actor says the stolen data includes employees’ unique identifiers, full names of employees for Dell and partners, status of employees (active or not), and an internal identification string.

Sep 23, 2024

Scientists Reveal: We’re Nearly Living in a Simulation. AI Can Help Us Hack and Escape

Posted by in categories: cybercrime/malcode, information science, robotics/AI

The potential pathways through which AI could help us escape a simulated reality are both fascinating and complex. One approach could involve AI discovering and manipulating the underlying algorithms that govern the simulation. By understanding these algorithms, AI could theoretically alter the simulation’s parameters or even create a bridge to the “real” world outside the simulation.

Another approach involves using AI to enhance our cognitive and perceptual abilities, enabling us to detect inconsistencies or anomalies within the simulation. These anomalies, often referred to as “glitches,” could serve as clues pointing to the artificial nature of our reality. For instance, moments of déjà vu or inexplicable phenomena might be more than just quirks of human perception—they could be signs of the simulation’s imperfections.

While the idea of escaping a simulation is intriguing, it also raises profound ethical and existential questions. For one, if we were to confirm that we are indeed living in a simulation, what would that mean for our understanding of free will, identity, and the meaning of life? Moreover, the act of escaping the simulation could have unforeseen consequences. If the simulation is designed to sustain and nurture human life, breaking free from it might expose us to a harsher and more dangerous reality.

Sep 16, 2024

Cybercriminals Exploit HTTP Headers for Credential Theft via Large-Scale Phishing Attacks

Posted by in categories: business, cybercrime/malcode, robotics/AI

It also follows the discovery of a stealthy threat actor that presents itself as a legitimate enterprise and has been advertising automated CAPTCHA-solving services at scale to other cybercriminals and helping them infiltrate IT networks.

Dubbed Greasy Opal by Arkose Labs, the Czech Republic-based “cyber attack enablement business” is believed to have been operational since 2009, offering to customers a toolkit of sorts for credential stuffing, mass fake account creation, browser automation, and social media spam at a price point of $190 and an additional $10 for a monthly subscription.

The product portfolio runs the cybercrime gamut, allowing them to develop a sophisticated business model by packaging several services together. The entity’s revenues for 2023 alone are said to be no less than $1.7 million.

Sep 16, 2024

Say Goodbye to Phishing: Must-Haves to Eliminate Credential Theft

Posted by in category: cybercrime/malcode

Discover how Beyond Identity’s deterministic security approach eliminates phishing, credential theft, and other cyber threats with passwordless, phish.

Sep 13, 2024

New Linux Malware Campaign Exploits Oracle Weblogic to Mine Cryptocurrency

Posted by in categories: cryptocurrencies, cybercrime/malcode

New Linux malware ‘Hadooken’ targets Oracle Weblogic, deploys crypto miners and DDoS botnet. Exploits vulnerabilities for lateral movement.

Sep 13, 2024

New Android Malware ‘Ajina.Banker’ Steals Financial Data and Bypasses 2FA via Telegram

Posted by in categories: cybercrime/malcode, finance, robotics/AI

New Android malware ‘Ajina. Banker’ targets bank customers in Central Asia, stealing financial data and intercepting 2FA messages via Telegram channels.

Sep 13, 2024

Beware: New Vo1d Malware Infects 1.3 Million Android-based TV Boxes Worldwide

Posted by in categories: cybercrime/malcode, robotics/AI

Vo1d malware infects 1.3M Android TV boxes in 197 countries. Learn about this new backdoor threat and how it compromises device security.

Sep 13, 2024

New PIXHELL acoustic attack leaks secrets from LCD screen noise

Posted by in categories: cybercrime/malcode, mobile phones

A novel acoustic attack named ‘PIXHELL’ can leak secrets from air-gapped and audio-gapped systems, and without requiring speakers, through the LCD monitors they connect to.

In a PIXHELL attack, malware modulates the pixel patterns on LCD screens to induce noise in the frequency range of 0–22 kHz, carrying encoded signals within those acoustic waves that can be captured by nearby devices such as smartphones.

The researchers’ tests showed that data exfiltration is possible at a maximum distance of 2 meters (6.5 ft), achieving a data rate of 20 bits per second (bps).

Page 6 of 218First345678910Last