BleepingComputer
10.4K subscribers
41 photos
24.6K links
Latest news and stories from BleepingComputer.com

From a bleeping computer to a working computer.
Download Telegram
Equifax Releases New Information About Security Breach as Top Execs Step Down

In a press release published late Friday night, credit rating and reporting firm Equifax revealed new details about the security breach that exposed the personal details of over 143 million users, and also announced the immediate retirement of two high-ranking executives. [...]

https://www.bleepingcomputer.com/news/security/equifax-releases-new-information-about-security-breach-as-top-execs-step-down/
The Loopix Anonymity System Wants to Be a More Secure Alternative to Tor

Loopix is a new anonymity network developed by a group of researchers from University College London (UCL) that comes with all the good parts of previous systems and new additions to improve security. [...]

https://www.bleepingcomputer.com/news/technology/the-loopix-anonymity-system-wants-to-be-a-more-secure-alternative-to-tor/
Researchers Discover New Android Banking Trojan

Security researchers have detected a new Android banking trojan by the name of Red Alert 2.0 that was developed during the past few months and has been recently rolled out into distribution. [...]

https://www.bleepingcomputer.com/news/security/researchers-discover-new-android-banking-trojan/
Locky Ransomware switches to the Ykcol Extension for Encrypted Files

Today a new Locky Ransomware variant was discovered by Stormshield malware analyst coldshell that switches to the .ykcol extension for encrypted files. It is important to note that if you are infected with this ransomware, you are not infected with the Ykcol Ransomware, but rather Locky. [...]

https://www.bleepingcomputer.com/news/security/locky-ransomware-switches-to-the-ykcol-extension-for-encrypted-files/
Avast Clarifies Details Surrounding CCleaner Malware Incident

Avast published earlier today a post-mortem of the CCleaner malware incident, in the hopes to clarify some of the details surrounding the event that many of its users found troubling. [...]

https://www.bleepingcomputer.com/news/security/avast-clarifies-details-surrounding-ccleaner-malware-incident/
Chinese Mobile Antivirus App Caught Siphoning User Data

Google removed — and then reinstated — one of the most popular mobile antivirus apps on the Play Store after security firm Check Point discovered that the app was secretly collecting device data from users' smartphones. [...]

https://www.bleepingcomputer.com/news/security/chinese-mobile-antivirus-app-caught-siphoning-user-data/
Russian Authorities Announce Takedown of RAMP Dark Web Marketplace

Russian police acknowledged today that they were responsible for taking down RAMP [Russian Anonymous Marketplace] — a Tor-based market that primarily sold drugs — a Russian Interior Ministry official told Russian news agency TASS today. [...]

https://www.bleepingcomputer.com/news/security/russian-authorities-announce-takedown-of-ramp-dark-web-marketplace/
Chrome Extension Embeds In-Browser Monero Miner That Drains Your CPU

The authors of SafeBrowse, a Chrome extension with more than 140,000 users, have embedded a JavaScript library in the extension's code that mines for the Monero cryptocurrency using users' computers and without getting their consent. [...]

https://www.bleepingcomputer.com/news/security/chrome-extension-embeds-in-browser-monero-miner-that-drains-your-cpu/
Malware Uses Security Cameras With Infrared Capabilities to Steal Data

Proof-of-concept malware created by a team of Israeli researchers uses the infrared capabilities of modern security cameras as a channel for data exfiltration, but also to receive new commands from its operators. [...]

https://www.bleepingcomputer.com/news/security/malware-uses-security-cameras-with-infrared-capabilities-to-steal-data/
Windows 10 Insider Build 16291 for PC Lets you Finish Articles Started on Your Phone

Today Microsoft released Insider Preview Build 16291 for PC to insiders on the fast ring that includes the ability for Cortana to transfer the current spot you are on in news articles or news listings to your PC. This allows you to read an article when on your phone and then continue reading it on your computer. [...]

https://www.bleepingcomputer.com/news/microsoft/windows-10-insider-build-16291-for-pc-lets-you-finish-articles-started-on-your-phone/
iTerm2 Leaks Everything You Hover in Your Terminal via DNS Requests

iTerm2, a popular Mac application that comes as a replacement for Apple's official Terminal app, just received a security fix minutes ago for a severe security issue that leaked terminal content via DNS requests. [...]

https://www.bleepingcomputer.com/news/security/iterm2-leaks-everything-you-hover-in-your-terminal-via-dns-requests/
Apple Issues Security Updates for iOS, iTunes, Xcode, Others

Apple published security updates and bulletins for six products such as Xcode 9, tvOS 11, watchOS 4, Safari 11, iOS 11, and iTunes 12.7 (for both macOS and Windows). [...]

https://www.bleepingcomputer.com/news/apple/apple-issues-security-updates-for-ios-itunes-xcode-others/
Optionsbleed Bug Leaks Apache Server Memory

Certain Apache server configurations can leak server memory content via a vulnerability called Optionsbleed — tracked as CVE-2017-9798 — and detailed on Monday by security researcher Hanno Böck. [...]

https://www.bleepingcomputer.com/news/security/optionsbleed-bug-leaks-apache-server-memory/
Attackers Can Use HVAC Systems to Control Malware on Air-Gapped Networks

Heating, ventilation, and air conditioning (HVAC) systems can be used as a means to bridge air-gapped networks with the outside world, allowing remote attackers to send commands to malware placed inside a target's isolated network. [...]

https://www.bleepingcomputer.com/news/security/attackers-can-use-hvac-systems-to-control-malware-on-air-gapped-networks/
The Shark CryptoMix Ransomware Variant Smells Blood in the Water

Today, I discovered a new variant of the CryptoMix ransomware that is appending the .SHARK extension to encrypted file names. This family of ransomware usually releases a new version almost every week, if not sooner, so it is a bit surprising to see them take almost three weeks to release this variant. [...]

https://www.bleepingcomputer.com/news/security/the-shark-cryptomix-ransomware-variant-smells-blood-in-the-water/