Threat actors in the wild are leveraging a recently discovered flaw in the ThinkPHP PHP framework to install cryptominers, skimmers, and other malware. Multiple threat actors are leveraging a recently discovered code execution vulnerability (CVE-2018-20062) in the ThinkPHP framework. The flaw was already addressed by the Chinese firm TopThink that designed the framework, but security expert […]
Hacking
Hackers infect e-commerce sites by compromising their advertising partner
Magecart strikes again, one of the most notorious hacking groups specializes in stealing credit card details from poorly-secured e-commerce websites. According to security researchers from RiskIQ and Trend Micro, cybercriminals of a new subgroup of Magecart, labeled as « Magecart Group 12, » recently successfully compromised nearly 277 e-commerce websites by using […]
Ukrainian Police Arrest 6 Hackers Linked to DDoS and Financial Attacks
Ukrainian Police have this week busted out two separate groups of hackers involved in carrying out DDoS attacks against news agencies and stealing money from Ukrainian citizens, respectively. According to the authorities, the four suspected hackers they arrested last week, all aged from 26 to 30 years, stole more than 5 […]
CISCO addresses DoS bugs in CISCO ESA products
Cisco addressed two DoS vulnerabilities in CISCO ESA products that can be exploited by remote unauthenticated attacker. Cisco fixed two denial-of-service (DoS) flaws in Email Security Appliance (ESA) products that can be exploited by a remote unauthenticated attacker. The first flaw tracked as CVE-2018-15453 has been rated as “critical,” it is a memory corruption […]
New Systemd Privilege Escalation Flaws Affect Most Linux Distributions
Security researchers have discovered three vulnerabilities in Systemd, a popular init system and service manager for most Linux operating systems, that could allow unprivileged local attackers or malicious programs to gain root access on the targeted systems. The vulnerabilities, assigned as CVE-2018-16864, CVE-2018-16865, and CVE-2018-16866, actually resides in the « systemd-journald » […]
Hackers Using Zero-Width Spaces to Bypass MS Office 365 Protection
Security researchers have been warning about a simple technique that cybercriminals and email scammers are already being using in the wild to bypass security features of Microsoft Office 365, including Safe Links, which are originally designed to protect users from malware and phishing attacks. Safe Links has been included by […]
PyLocky Ransomware Decryption Tool Released — Unlock Files For Free
If your computer has been infected with PyLocky Ransomware and you are searching for a free ransomware decryption tool to unlock or decrypt your files—your search might end here. Security researcher Mike Bautista at Cisco’s Talos cyber intelligence unit have released a free decryption tool that makes it possible for victims infected with […]
Did Aurora Ransomware infect you? You can decrypt file for free
Victims of the Aurora Ransomware could use a decryptor tool developed by the popular malware researcher Michael Gillespie to decrypt their data for free. Good news for the victims of the Aurora Ransomware, there are many variants of this Windows malware but most of the victims have been infected by […]
New NRSMiner cryptominer NSA-Linked EternalBlue Exploit
A new variant of the NRSMiner is infecting users in the southern region of Asia, most of the victims are in Vietnam (54%), Iran (16%) and Malaysia (12%). The new version leverages the EternalBlue exploit to spread, experts observed that the threat also updates existing NRSMiner installs. ETERNALBLUE is an NSA exploit that […]
The Dark Overlord déclare la guerre aux entreprises
Je vous révélais, il y a quelques jours, la diffusion de documents étonnants émanant d’un piratage informatique signé par le groupe The Dark Overlord. Les hackers noirs ont mis en ligne plusieurs centaines de documents sensibles, volés à des cabinets d’avocats, concernant les attentats du 11 septembre. The Dark Overlord semble […]