#HackerNews A newly discovered evasive malware leverages the Secure Shell (SSH) cryptographic protocol to gain entry into targeted systems with the goal of mining cryptocurrency and carrying out distributed denial-of-service (DDoS) attacks. Dubb...
Monday, November 14, 2022
New KmsdBot Malware Hijacking Systems for Mining Crypto and Launch DDoS Attacks #Cybersecurity
Worok Hackers Abuse Dropbox API to Exfiltrate Data via Backdoor Hidden in Images #Cybersecurity
#HackerNews A recently discovered cyber espionage group dubbed Worok has been found hiding malware in seemingly innocuous image files, corroborating a crucial link in the threat actor's infection chain. Czech cybersecurity firm Avast said the pu...
Wednesday, November 9, 2022
APT29 Exploited a Windows Feature to Compromise European Diplomatic Entity Network #Cybersecurity
#HackerNews The Russia-linked APT29 nation-state actor has been found leveraging a "lesser-known" Windows feature called Credential Roaming as part of its attack against an unnamed European diplomatic entity. "The diplomatic-centric targeting is...
Several Cyber Attacks Observed Leveraging IPFS Decentralized Network #Cybersecurity
#HackerNews A number of phishing campaigns are leveraging the decentralized Interplanetary Filesystem (IPFS) network to host malware, phishing kit infrastructure, and facilitate other attacks. "Multiple malware families are currently being hoste...
Tuesday, November 8, 2022
Amadey Bot Spotted Deploying LockBit 3.0 Ransomware on Hacked Machines #Cybersecurity
#HackerNews The Amadey malware is being used to deploy LockBit 3.0 ransomware on compromised systems, researchers have warned. "Amadey bot, the malware that is used to install LockBit, is being distributed through two methods: one using a malici...
New Laplas Clipper Malware Targeting Cryptocurrency Users via SmokeLoader #Cybersecurity
#HackerNews Cryptocurrency users are being targeted with a new clipper malware strain dubbed Laplas by means of another malware known as SmokeLoader. SmokeLoader, which is delivered by means of weaponized documents sent through spear-phishing em...