Google reveals a new malicious tool used by Iranian government-backed hackers to retrieve user data from compromised Gmail, Yahoo! and Microsoft Outlook accounts.
Read details: https://thehackernews.com/2022/08/google-uncovers-tool-used-by-iranian.html
Read details: https://thehackernews.com/2022/08/google-uncovers-tool-used-by-iranian.html
π45π₯24π±16π€―13π€8π4
DevOps platform GitLab releases patches to fix a critical vulnerability in its software that could lead to the execution of arbitrary code on affected systems.
Read details: https://thehackernews.com/2022/08/gitlab-issues-patch-for-critical-flaw.html
Read details: https://thehackernews.com/2022/08/gitlab-issues-patch-for-critical-flaw.html
π€―32π23π₯7π±5
Researchers discovered another large-scale adversary-in-the-middle (AiTM) campaign targeting Google Workspace enterprise users with advanced phishing kits that bypass multi-factor authentication.
Read details: https://thehackernews.com/2022/08/researchers-warn-of-aitm-attack.html
Read details: https://thehackernews.com/2022/08/researchers-warn-of-aitm-attack.html
π30π€―14π₯7π±5π€1
Researchers uncover a widespread campaign in which hackers use compromised WordPress sites to display fraudulent Cloudflare DDoS protection pages and spread malware such as NetSupport RAT and Raccoon Stealer.
Details: https://thehackernews.com/2022/08/hackers-using-fake-ddos-protection.html
Details: https://thehackernews.com/2022/08/hackers-using-fake-ddos-protection.html
π19π14π±11π€―8π5
Researchers have demonstrated a new AIR-GAP data exfiltration technique in which malware uses network interface card (NIC) LEDs to transmit covert Morse code signals that can be decoded from tens to hundreds of meters away.
Read details: https://thehackernews.com/2022/08/air-gapped-devices-can-send-covert.html
Read details: https://thehackernews.com/2022/08/air-gapped-devices-can-send-covert.html
π€―45π19π₯8π±7π4
A growing number of cybercriminals have begun using the peer-to-peer instant messaging service Tox as a command-and-control method for cryptocurrency mining #malware.
Read: https://thehackernews.com/2022/08/crypto-miners-using-tox-p2p-messenger.html
Read: https://thehackernews.com/2022/08/crypto-miners-using-tox-p2p-messenger.html
π±38π€12π10π₯9π5π€―5π1
PyPI repository has sounded the alarm about an ongoing phishing campaign aimed at stealing developers' credentials and injecting malicious updates into legitimate Python packages.
Read details: https://thehackernews.com/2022/08/pypi-repository-warns-python-project.html
Read details: https://thehackernews.com/2022/08/pypi-repository-warns-python-project.html
π38π€―11π₯9π€6
Microsoft uncovered βMagicWeb,β a new "highly-targeted" post-exploitation malware used by the Nobelium APT hackers to maintain persistent access to compromised environments.
Read details: https://thehackernews.com/2022/08/microsoft-uncovers-new-post-compromise.html
Read details: https://thehackernews.com/2022/08/microsoft-uncovers-new-post-compromise.html
π29π€―7π₯6π±2
Researchers uncover malware and infrastructure of North Korean Kimusky hackers targeting South Korean politicians and diplomats.
Read details: https://thehackernews.com/2022/08/researchers-uncover-kimusky-infra.html
Read details: https://thehackernews.com/2022/08/researchers-uncover-kimusky-infra.html
π36π€7
Okta Hackers behind the cyberattacks on Twilio and Cloudflare earlier this month have been linked to a broader campaign that compromised 9,931 accounts at 136 organizations.
Read details: https://thehackernews.com/2022/08/okta-hackers-behind-twilio-and.html
Read details: https://thehackernews.com/2022/08/okta-hackers-behind-twilio-and.html
π39π€6π±1
Nation-state threat actors are increasingly adopting and integrating the "Sliver" command-and-control (C2) framework into their intrusion campaigns as a replacement for Cobalt Strike.
Read details: https://thehackernews.com/2022/08/cybercrime-groups-increasingly-adopting.html
Read details: https://thehackernews.com/2022/08/cybercrime-groups-increasingly-adopting.html
π43π€11π5
Iranian state-sponsored hacker 'MERCURY' are leaving no stone unturned to exploit unpatched systems with Log4j to target Israeli entities, suggesting that the vulnerability's long tail for remediation.
Read details: https://thehackernews.com/2022/08/iranian-hackers-exploiting-unpatched.html
Read details: https://thehackernews.com/2022/08/iranian-hackers-exploiting-unpatched.html
π₯49π27π€14π±11π7π€―5π4
CISA has added 10 actively exploited vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog, including flaws in dotCMS, CouchDB, WebRTC, iOS, macOS, and Delta Electronics' industrial automation #software.
Details: https://thehackernews.com/2022/08/cisa-adds-10-new-known-actively.html
Details: https://thehackernews.com/2022/08/cisa-adds-10-new-known-actively.html
π20π±15π6π€1
Twilio says hackers also gained access to the two-factor authentication (2FA) Authy accounts of 93 users in a recent security breach.
Read details: https://thehackernews.com/2022/08/twilio-breach-also-compromised-authy.html
Read details: https://thehackernews.com/2022/08/twilio-breach-also-compromised-authy.html
π±35π20π16π€1
Researchers uncover an active cryptocurrency mining campaign that infected over 111,000 victims in 11 countries using fake software disguised as installers for popular applications.
Read details: https://thehackernews.com/2022/08/nitrokod-crypto-miner-infected-over.html
Read details: https://thehackernews.com/2022/08/nitrokod-crypto-miner-infected-over.html
π30π±10π4π€1
A new ransomware strain written in Golang dubbed "Agenda", which comes with the ability to customize binary payloads for individual victims, has been spotted in the wild targeting healthcare and education entities.
Details: https://thehackernews.com/2022/08/new-golang-based-agenda-ransomware-can.html
Details: https://thehackernews.com/2022/08/new-golang-based-agenda-ransomware-can.html
π±27π12π€―11π₯7π€2
The U.S. Federal Trade Commission (FTC) has filed suit against Kochava, a location data broker, for collecting and selling precise geolocation data gathered from hundreds of millions of consumers' mobile devices.
Details: https://thehackernews.com/2022/08/ftc-sues-data-broker-over-selling.html
Details: https://thehackernews.com/2022/08/ftc-sues-data-broker-over-selling.html
π32π11π€―7π€5π₯3
India's newest commercial airline, "Akasa Air," has had its customers' personal data exposed, which the company attributes to a technical configuration error.
Read details: https://thehackernews.com/2022/08/indias-newest-airline-akasa-air-suffers.html
Read details: https://thehackernews.com/2022/08/indias-newest-airline-akasa-air-suffers.html
π34π€―17π10π₯10π7
Researchers uncover three related but distinct campaigns that spread malware such as ModernLoader, RedLine stealer, and cryptocurrency miners.
Read: https://thehackernews.com/2022/08/hackers-use-modernloader-to-infect.html
Read: https://thehackernews.com/2022/08/hackers-use-modernloader-to-infect.html
π23π₯14π€―2
A Chinese hacker group conducted a months-long cyberespionage campaign against several entities using ScanBox Reconnaissance Framework to gather information about its victims.
Read details: https://thehackernews.com/2022/08/chinese-hackers-used-scanbox-framework.html
Read details: https://thehackernews.com/2022/08/chinese-hackers-used-scanbox-framework.html
π20π6π±5
Google has introduced a new bug bounty program for its open source projects, with payouts ranging from $100 to $31,337 to protect the ecosystem from supply chain attacks.
Read details: https://thehackernews.com/2022/08/google-launches-new-open-source-bug.html
Read details: https://thehackernews.com/2022/08/google-launches-new-open-source-bug.html
π₯50π18π10