There is a new attack vector in town – the customization of phishing kits. In a recent case uncovered by PhishMe Intelligence, a phishing kit was crafted to target residents of specific regions using either TrickBot or Locky. Instead of determining what malware to deploy, this kit determined what personal […]
Hacking
Attackers can Steal Sensitive Data by Abusing CSS – CSS Exfil Vulnerability
CSS is a stylesheet language which provides a presentation for documents, all our modern websites heavily depend on the CSS. A new CSS vulnerability dubbed CSS Exfil can be used by attackers to steal data from the webpages using CSS. With the vulnerability, attackers can steal sensitive data’s including usernames, […]
Linkedin Phishing scam that only works in Firefox using data text urls
We see lots of phishing attempts for email credentials. This one is slightly different than many others and much more involved and complicated. The email has a link to a site which contains a data:text base64 encoded content. data:text urls are dangerous and recently Internet Explorer and Google Chrome have stopped […]
GandCrab Ransomware: Now Coming From Malspam
Introduction GandCrab ransomware was first reported on Friday 2018-01-26. Since then, we’ve seen it distributed by campaigns using exploit kits and HoeflerText popup windows. But today on Wednesday 2018-02-07, we’ve also seen GandCrab ransomware distributed through malicious spam (malspam). Today’s GandCrab is a file-less infection using a DLL file called […]
Cryptocurrency Mining Malware Hits Monitoring Systems at European Water Utility
Malware Chewed Up CPU of HMI at Wastewater Facility Cryptocurrency mining malware worked its way onto four servers connected to an operational technology (OT) network at a wastewater facility in Europe, industrial cybersecurity firm Radiflow told SecurityWeek Wednesday. Radiflow says the incident is the first documented cryptocurrency malware attack to […]
How to track smartphone users when they’ve turned off GPS
As it turns out, turning off location services (e.g., GPS) on your smartphone doesn’t mean an attacker can’t use the device to pinpoint your location. A group of Princeton University researchers has devised of a novel user-location mechanism that exploits non-sensory and sensory data stored on the smartphone (the environment’s […]
Tweak to Chrome Performance Will Indirectly Stifle Cryptojacking Scripts
A change meant to improve Google Chrome performance will also indirectly impact cryptojacking scripts (in-browser cryptocurrency miners) and will severely reduce their efficiency. According to a design document seen by Bleeping Computer, Google engineers plan to limit the CPU power some types of JS scripts running in the browser’s background […]
Cyber Espionage Group Targets Asian Countries With Bitcoin Mining Malware
Security researchers have discovered a custom-built piece of malware that’s wreaking havoc in Asia for past several months and is capable of performing nasty tasks, like password stealing, bitcoin mining, and providing hackers complete remote access to compromised systems. Dubbed Operation PZChao, the attack campaign discovered by the security researchers […]
Automated Hacking Tool Autosploit Cause Concerns Over Mass Exploitation
The Autosploit hacking tool was developed aiming to automate the compromising of remote hosts both by collecting automatically targets as well as by using Shodan.io API. Users can define its platform search queries like Apache, IIS and so forth to gather targets to be attacked. After gathering the targets, the tool […]
Malicious Reddit clone fooling users into giving away logins
It recently came to light that cybercriminals have been deceiving ‘Reddit’ users into voluntarily handing over their usernames and passwords. Why would anyone do that of their own free will you might ask? It all comes down to a simple typo – reddit.co instead of reddit.com When users accidentally type […]