North Korea and Iran Use CodeProject to Develop Their Malware
Software developers and malware authors share a desire to work smart, not hard In the software development world, engineers frequently use ready-made code for various tasks, whether it involves copying a snippet from Stack Overflow, taking a library from Github, or reusing a company’s own rich, legacy code base. On […]
FIN7 Hackers Change Attack Techniques
The financially-motivated FIN7 hacking group recently switched to a new delivery technique and has been employing a different malware obfuscation method, ICEBRG security researchers reveal. Highly active since the beginning of 2017, FIN7 (also known as Anunak, or Carbanak) started distributing malware via LNK files embedded in Word documents using […]
4G/5G Wireless Networks as Vulnerable as WiFi and putting SmartCities at Risk
Researchers from security firm Positive Technologies warns of 4G/5G Wireless Networks as vulnerable as WiFi and putting smart-cities at risk The Internet of Things (IoT) presents many new opportunities and some different challenges. The vast number of devices makes it very expensive to connect everything with traditional network cabling and […]
ATMii Malware can make ATMs drain available cash
Security researchers from Kaspersky have detected a new ATM malware called ATMii that targets only ATMs operating on Microsoft Windows 7 and Windows Vista. The malware was first detected in April 2017 when one of the affected banks shared the malware with Kaspersky security researchers. The malware consists of two […]
MICROSOFT PATCHES CRITICAL WINDOWS DNS CLIENT VULNERABILITIES
Three critical Windows DNS client vulnerabilities were patched today by Microsoft, closing off an avenue where an attacker could relatively simply respond to DNS queries with malicious code and gain arbitrary code execution on Windows clients or Windows Server installations. The flaws were discovered and privately disclosed to Microsoft by […]
Israel hacked Kaspersky, then tipped the NSA that its tools had been breached
In 2015, Israeli government hackers saw something suspicious in the computers of a Moscow-based cybersecurity firm: hacking tools that could only have come from the National Security Agency. Israel notified the NSA, where alarmed officials immediately began a hunt for the breach, according to people familiar with the matter, who […]
North Korean hackers stole US-South Korea war plans, official says
North Korean hackers allegedly stole classified military documents from a South Korean Defense Ministry database in September 2016, according to Rhee Cheol-hee, a member of South Korea’s National Assembly. Rhee, who belongs to the ruling Democratic Party and sits on the Defense Committee, told CNN on Tuesday that he received […]
Investigation reveals large botnet hiding behind Fast Flux technique
Fast Flux, a DNS technique first introduced in 2006 and widely associated with the Storm Worm malware variants, can be used by botnets to hide various types of malicious activities – including phishing, web proxying, malware delivery, and malware communication. The technique allows the botnet to “hide” behind an ever-changing […]
Le phishing et les mesures à suivre pour s’en protéger
Le phishing et les mesures à suivre pour s’en protéger Le phishing (contraction des mots anglais « fishing », en français pêche, et «phreaking », désignant le piratage de lignes téléphoniques), traduit parfois en «hameçonnage », est une technique frauduleuse utilisée par les pirates informatiques pour récupérer des informations auprès […]