The Hacker News
βœ”
151K subscribers
1.86K photos
10 videos
3 files
7.78K links
⭐ Official THN Telegram Channel β€” A trusted, widely read, independent source for breaking news and tech coverage about cybersecurity and hacking.

πŸ“¨ Contact: admin@thehackernews.com

🌐 Website: https://thehackernews.com
Download Telegram
An ongoing wave of malware attacks targeting hospitality, hotel, and travel organizations has been tied to a financially motivated cybercrime group.

Read details: https://thehackernews.com/2022/08/cybercrime-group-ta558-targeting.html
πŸ‘8πŸ”₯1
CISA has updated its Known Exploited Vulnerabilities Catalog with 7 new vulnerabilities based on evidence of active exploitation.

Read details: https://thehackernews.com/2022/08/cisa-adds-7-new-actively-exploited.html

CVE-2017-15944, CVE-2022-21971, CVE-2022-26923, CVE-2022-2856, CVE-2022-32893, CVE-2022-32894, CVE-2022-22536
πŸ‘6πŸ”₯2
A new Grandoreiro banking trojan campaign has been spotted targeting manufacturers in Spanish-speaking countries such as Spain and Mexico.

Read details: https://thehackernews.com/2022/08/new-grandoreiro-banking-malware.html
πŸ‘11🀯3
Researchers have uncovered multiple vulnerabilities in ultra-wideband (UWB) real-time location systems (RTLS) that allow threat actors to launch adversary-in-the-middle (AitM) attacks and manipulate location data.

Read details: https://thehackernews.com/2022/08/rtls-systems-found-vulnerable-to-mitm.html
πŸ‘19🀯1
Researchers have discovered counterfeit Android phones of popular smartphone brands are pre-infected with multiple trojans designed to target WhatsApp and WhatsApp Business.

Read details: https://thehackernews.com/2022/08/researchers-find-counterfeit-phones.html
πŸ‘19🀯3
U.S. cybersecurity agency CISA warns of active exploitation of a high-severity reflected/amplified DoS attack vulnerability (CVE-2022-0028) in Palo Alto Networks' PAN-OS.

Read details: https://thehackernews.com/2022/08/cisa-warns-of-active-exploitation-of.html
πŸ‘25😱5πŸ‘4πŸ”₯2😁1
Researchers have developed a new Air-Gap attack in which attackers can exfiltrate sensitive information from air-gapped computers to smartphones located a few meters away via Speakers-to-Gyroscope covert channel.

Details: https://thehackernews.com/2022/08/new-air-gap-attack-uses-mems-gyroscope.html
πŸ‘30😱28πŸ€”3😁2πŸ”₯1
Iranian hackers (UNC3890) have been linked to a series of attacks aimed at Israeli shipping, government, energy, and healthcare organizations as part of an espionage-focused campaign.

Read details: https://thehackernews.com/2022/08/suspected-iranian-hackers-targeted.html
πŸ‘60🀯15πŸ‘11πŸ”₯9😱6πŸ€”3
Hackers have updated the nasty XCSSET malware to add support for macOS Monterey by updating the source code components to Python 3.

Read details: https://thehackernews.com/2022/08/xcsset-malware-updates-with-python-3-to.html
πŸ”₯27πŸ‘19🀯11πŸ‘5😱5πŸ€”2
Google reveals a new malicious tool used by Iranian government-backed hackers to retrieve user data from compromised Gmail, Yahoo! and Microsoft Outlook accounts.

Read details: https://thehackernews.com/2022/08/google-uncovers-tool-used-by-iranian.html
πŸ‘45πŸ”₯24😱16🀯13πŸ€”8😁4
DevOps platform GitLab releases patches to fix a critical vulnerability in its software that could lead to the execution of arbitrary code on affected systems.

Read details: https://thehackernews.com/2022/08/gitlab-issues-patch-for-critical-flaw.html
🀯32πŸ‘23πŸ”₯7😱5
Researchers discovered another large-scale adversary-in-the-middle (AiTM) campaign targeting Google Workspace enterprise users with advanced phishing kits that bypass multi-factor authentication.

Read details: https://thehackernews.com/2022/08/researchers-warn-of-aitm-attack.html
πŸ‘30🀯14πŸ”₯7😱5πŸ€”1
Researchers uncover a widespread campaign in which hackers use compromised WordPress sites to display fraudulent Cloudflare DDoS protection pages and spread malware such as NetSupport RAT and Raccoon Stealer.

Details: https://thehackernews.com/2022/08/hackers-using-fake-ddos-protection.html
πŸ‘19πŸ‘14😱11🀯8😁5
Researchers have demonstrated a new AIR-GAP data exfiltration technique in which malware uses network interface card (NIC) LEDs to transmit covert Morse code signals that can be decoded from tens to hundreds of meters away.

Read details: https://thehackernews.com/2022/08/air-gapped-devices-can-send-covert.html
🀯45πŸ‘19πŸ”₯8😱7😁4
A growing number of cybercriminals have begun using the peer-to-peer instant messaging service Tox as a command-and-control method for cryptocurrency mining #malware.

Read: https://thehackernews.com/2022/08/crypto-miners-using-tox-p2p-messenger.html
😱38πŸ€”12πŸ‘10πŸ”₯9😁5🀯5πŸ‘1
PyPI repository has sounded the alarm about an ongoing phishing campaign aimed at stealing developers' credentials and injecting malicious updates into legitimate Python packages.

Read details: https://thehackernews.com/2022/08/pypi-repository-warns-python-project.html
πŸ‘38🀯11πŸ”₯9πŸ€”6
Microsoft uncovered β€œMagicWeb,” a new "highly-targeted" post-exploitation malware used by the Nobelium APT hackers to maintain persistent access to compromised environments.

Read details: https://thehackernews.com/2022/08/microsoft-uncovers-new-post-compromise.html
πŸ‘29🀯7πŸ”₯6😱2
Researchers uncover malware and infrastructure of North Korean Kimusky hackers targeting South Korean politicians and diplomats.

Read details: https://thehackernews.com/2022/08/researchers-uncover-kimusky-infra.html
πŸ‘36πŸ€”7
Okta Hackers behind the cyberattacks on Twilio and Cloudflare earlier this month have been linked to a broader campaign that compromised 9,931 accounts at 136 organizations.

Read details: https://thehackernews.com/2022/08/okta-hackers-behind-twilio-and.html
πŸ‘39πŸ€”6😱1
Nation-state threat actors are increasingly adopting and integrating the "Sliver" command-and-control (C2) framework into their intrusion campaigns as a replacement for Cobalt Strike.

Read details: https://thehackernews.com/2022/08/cybercrime-groups-increasingly-adopting.html
πŸ‘43πŸ€”11😁5
Iranian state-sponsored hacker 'MERCURY' are leaving no stone unturned to exploit unpatched systems with Log4j to target Israeli entities, suggesting that the vulnerability's long tail for remediation.

Read details: https://thehackernews.com/2022/08/iranian-hackers-exploiting-unpatched.html
πŸ”₯49πŸ‘27πŸ€”14😱11😁7🀯5πŸ‘4