Security experts at Cisco Talos discovered a new piece of malware dubbed GoScanSSH that was being used to compromise SSH servers exposed online. Security researchers at Cisco Talos have discovered a new piece of malware dubbed GoScanSSH that was being used to compromise SSH servers exposed online. The malicious code was written in […]
Hacking
Britain Backs US Hacking Allegations Against Iranians
The British government says it concurs with charges contained in an indictment announced Friday by the U.S. Department of Justice against multiple Iranians. The indictment, unsealed Friday, charges nine Iranian nationals with stealing more than 31 terabytes of data from 320 universities in 22 countries – including 144 U.S. institutions […]
Law enforcement arrested the head of the Carbanak gang that stole 1 billion from banks
The head of the crime ring behind the Carbanak gang that since 2013 targeted banks worldwide has been arrested in Spain. The mastermind suspected of stealing about £870m (€1bn) in a bank cyber heist has been arrested in Spain. The man is suspected to be the kingpin of the crime ring behind the Carbanak […]
Facebook collected call and SMS data from Android users if not explicitly forbidden
After the Cambridge Analytica scandal, Facebook made the headlines again, the company collected users’ Android call and SMS metadata for years. The Cambridge Analytica case it raised the discussion about the power of social networks and the possibility of their abuse for the conditioning of political activities. The non-professionals have discovered how important their […]
Do you have what it takes to withstand modern DDoS attacks?
As the latest record DDoS attack hit GitHub and threatened to overwhelm its edge network, the popular Git-repository hosting service quickly switched to routing the attack traffic to their DDoS mitigation service. In the end, GitHub ended up completely unavailable for five minutes and intermittently unavailable for four. But […]
Emails de phishing Apple : des faux messages cencés provenir d’iTunes et de l’App Store
Récemment, l’apparition d’une nouvelle attaque de phishing a fait son apparition. Elle se présentait sous la forme de faux messages de renouvellement d’abonnement à l’App Store, qui s’avéraient être des emails de phishing imitant les emails officiels d’Apple. Vous avez déjà reçu un email qui ressemble à s’y méprendre à […]
A new massive cryptomining campaign target Linux servers exploiting old flaw
Trend Micro uncovered a new crypto mining campaign targeting Linux servers that exploit the CVE-2013-2618 flaw in Cacti’s Network Weathermap plug-in, which system administrators use to visualize network activity. Security firm Trend Micro uncovered new crypto mining campaign, a cybercriminal gang has made nearly $75,000 by installing a Monero miner […]
The DiskWriter or UselessDisk BootLocker May Be A Wiper
A new MBR bootlocker called DiskWriter, or UselessDisk, has been discovered that overwrites the MBR of a victim’s computer and then displays a ransom screen on reboot instead of booting into Windows. This ransom note asks for $300 in bitcoins in order to gain access to Windows again. Ransom Screen First […]
Firefox Working on Protection Against In-Browser Cryptojacking Scripts
Firefox engineers are working on a method to address the recent rise in usage of in-browser miners (cryptojacking scripts) that are, in most cases, ruining the web surfing experience of most users. Plans to address this growing scourge were revealed in an email interview Bleeping Computer had with Peter Dolanjski, Product Manager […]
The AVCrypt Ransomware Tries To Uninstall Your AV Software
A new ransomware named AVCrypt has been discovered that tries to uninstall existing security software before it encrypts a computer. Furthermore, as it removes numerous services, including Windows Update, and provides no contact information, this ransomware may be a wiper. After analysis by MalwareHunterTeam, who discovered the ransomware, myself, and Michael Gillespie, it […]