An expert found evidences that demonstrate the current distributed LokiBot malware samples were “hijacked” by a third actor. According to the researcher who goes online by the Twitter handle “d00rt,” samples of the LokiBot malware samples being distributed in the wild are modified versions of the original sample. The Lokibot […]
Année : 2018
Smart Speaker Banking Is Coming to a Device Near You, But Is It Secure?
Smart speaker Banking Is coming to a device near you, Which are the cyber risks associated with their use? Are they a new opportunity for attackers? The popularity of voice-activated smart speakers like the Google Home and Amazon Echo has made brands, and industries realize there’s adequate demand for introducing technology that lets people […]
HNS Botnet evolves and targets cross-platform database solutions
The HNS IoT botnet (Hide and Seek) originally discovered by BitDefender in January evolves and now targets cross-platform database solutions. Do you remember the Hide ‘N Seek (HNS) botnet? The IoT botnet Hide ‘N Seek botnet appeared in the threat landscape in January, when it was first spotted on January 10th by malware researchers from Bitdefender. It was […]
New Rakhni variant could infect systems with either a ransomware or a miner
Security researchers at Kaspersky Labs have discovered a new strain of the Rakhni malware that could infect systems with either a ransomware or a cryptocurrency miner. Experts from Kaspersky Labs have discovered a new strain of the Rakhni ransomware family that could infect systems with either a ransomware or a cryptocurrency miner depending upon their configurations. “Way back […]
MICROSOFT PUBLIE LES DÉTAILS TECHNIQUES DE DEUX VULNÉRABILITÉS IMPORTANTES DÉCOUVERTES EN MARS
Des chercheurs d’ESET et Microsoft ont publié les détails techniques de deux vulnérabilités de type «zero-day» découvertes en mars 2018. Les deux failles ont été corrigées par Microsoft lors du Patch Tuesday de mai 2018. L’exploitation de la première vulnérabilité permettrait l’exécution de code arbitraire à distance dans Adobe Acrobat et […]
Malware “WellMess” Targeting Linux and Windows
Some malware is designed to run on multiple platforms, and most commonly they are written in Java. For example, Adwind malware (introduced in a past article) is written in Java, and it runs on Windows and other OS. Golang is another programming language, and it is used for Mirai controller, which […]
Hamas cyber-operatives lure Israeli soldiers to spyware hidden in tainted apps
Israeli military intelligence accused Hamas operatives of creating tainted apps to lure soldiers into downloading spyware onto their phones. According to a report published by the Israeli military, Hamas hackers are attempting to lure Israel Defence Forces (IDF) soldiers into installing tainted apps on their devices. Israeli military already blamed Hamas […]
Gentoo Publishes Incident Report After GitHub Hack
Maintainers of the Gentoo Linux distribution published an incident report on Wednesday after someone hijacked one of the organization’s GitHub accounts and planted malicious code. The attack started on June 28 and the hacker (or hackers) not only changed content in compromised repositories, but also locked out Gentoo developers from the targeted […]
HPE CORRIGE UNE VULNÉRABILITÉ IMPORTANTE DANS INTEGRATED LIGHTS-OUT
HPE Integrated Lights-Out (iLO) est une technologie de gestion de serveurs à distance de Hewlett-Packard. Elle offre des fonctionnalités de gestion hors-bande (démarrage d’une machine éteinte à distance, accès à la console système à distance…). Une vulnérabilité importante a été identifiée dans iLO 4 et 5. Son exploitation permettrait la […]
Crooks leverage obfuscated Coinhive shortlink in a large crypto-mining operation
Crooks leverage an alternative scheme to mine cryptocurrencies, they don’t inject the CoinHive JavaScript miner directly into compromised websites. Security researchers at MalwareLabs have uncovered a new crypto mining campaign that leverages an alternative scheme to mine cryptocurrencies, differently from other campaigns, crooks don’t inject the CoinHive JavaScript miner directly in compromised […]