BleepingComputer
10.3K subscribers
41 photos
24.5K links
Latest news and stories from BleepingComputer.com

From a bleeping computer to a working computer.
Download Telegram
Lone Nigerian Hacker Behind Hacks at 4,000 Organizations

One lone hacker operating out of Lagos, Nigeria was able to hack into over 4,000 organizations across the globe using basic techniques and antiquated tools, according to an investigation by researchers at Check Point. [...]

https://www.bleepingcomputer.com/news/security/lone-nigerian-hacker-behind-hacks-at-4-000-organizations/
SyncCrypt Ransomware Hides Inside JPG Files, Appends .KK Extension

A new ransomware called SyncCrypt was discovered that is being distributed by spam attachments pretending to be court orders. This ransomware uses a interesting approach of embedding a zip file in a jpg image in order to avoid detection. [...]

https://www.bleepingcomputer.com/news/security/synccrypt-ransomware-hides-inside-jpg-files-appends-kk-extension/
Locky Ransomware switches to the Lukitus extension for Encrypted Files

Today a new Locky Ransomware variant was discovered that switches to the .lukitus extension for encrypted files. It is not currently known how this variant is being distributed, but as the ransomware is being downloaded from a remote site it is most likely malspam. [...]

https://www.bleepingcomputer.com/news/security/locky-ransomware-switches-to-the-lukitus-extension-for-encrypted-files/
Unpatchable Flaw Affects Most of Today's Modern Cars

A flaw buried deep in the hearts of all modern cars allows an attacker with local or even remote access to a vehicle to shut down various components, including safety systems such as airbags, brakes, parking sensors, and others. [...]

https://www.bleepingcomputer.com/news/security/unpatchable-flaw-affects-most-of-todays-modern-cars/
Computers, Smartphones Can Be Used as a Sonar-Like Tracking System

New research published this week by researchers from the University of Washington shows how an attacker could track a user's movements using speakers and microphones that come with computers, laptops, tablets, smartphones, and other devices. [...]

https://www.bleepingcomputer.com/news/security/computers-smartphones-can-be-used-as-a-sonar-like-tracking-system/
New ERROR CryptoMix Ransomware Variant Released

Today, BleepingComputer discovered a new variant of the CryptoMix ransomware that is appending the .ERROR extension to encrypted file names. This article will provide a brief summary of what has changed in this new variant. [...]

https://www.bleepingcomputer.com/news/security/new-error-cryptomix-ransomware-variant-released/
Tsunami of DDoS-for-Hire Platforms Coming From the East

Over the past six months, a large number of DDoS-for-hire platforms β€” also known as DDoS booters or DDoS stressors β€” have appeared in China, all sporting the same interface, and seeming to be based on the same source code. [...]

https://www.bleepingcomputer.com/news/security/tsunami-of-ddos-for-hire-platforms-coming-from-the-east/
The Week in Ransomware - August 18th 2017 - SyncCrypt, GlobeImposter, & Locky

While the week was dominated by small little ransomware creations, we did have some interesting news. First, we have had a resurgence of Locky variants, then a constant stream of GlobeImposter variants variants, and finally the SynCrypt ransomware that utilizes an interesting distribution method. [...]

https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-august-18th-2017-synccrypt-globeimposter-and-locky/