Researchers retrieve the master key to unlock files locked by the Hive ransomware by exploiting a vulnerability in its encryption algorithm.
Read details: https://thehackernews.com/2022/02/master-key-for-hive-ransomware.html
Read details: https://thehackernews.com/2022/02/master-key-for-hive-ransomware.html
Hackers are using infected Android devices to register mass disposable accounts that can be abused by cybercriminals to create phone-verified accounts for fraud and other criminal activities.
Details: https://thehackernews.com/2022/02/hackers-exploit-bug-in-sms-verification.html
Details: https://thehackernews.com/2022/02/hackers-exploit-bug-in-sms-verification.html
Researchers uncover details of a recent cyberattack that targeted Iranian State Broadcaster IRIB with an unidentified destructive wiper malware.
https://thehackernews.com/2022/02/iranian-state-broadcaster-irib-hits-by_21.html
https://thehackernews.com/2022/02/iranian-state-broadcaster-irib-hits-by_21.html
Researchers discover a new Android banking malware β dubbed "Xenomorph" β that spreads via apps on the Google Play Store and is designed to target customers of dozens of European banks.
Read: https://thehackernews.com/2022/02/xenomorph-android-banking.html
Read: https://thehackernews.com/2022/02/xenomorph-android-banking.html
Hackers are exploiting unpatched vulnerabilities in Internet-faced Microsoft SQL servers that to backdoor them using the Cobalt Strike hacking tool.
Read details: https://thehackernews.com/2022/02/hackers-backdoor-unpatched-microsoft.html
Read details: https://thehackernews.com/2022/02/hackers-backdoor-unpatched-microsoft.html
Chinese APT10 state-sponsored hackers carried out a sophisticated organized supply-chain attack on Taiwan's financial and securities trading sector.
Read details: https://thehackernews.com/2022/02/chinese-hackers-target-taiwans.html
Read details: https://thehackernews.com/2022/02/chinese-hackers-target-taiwans.html
Hackers took advantage of smart contract upgrade process on the OpenSea NFT marketplace to conduct a phishing attack against its users, resulting in the theft of approximately $1.7 million worth of virtual assets.
Read: https://thehackernews.com/2022/02/hackers-steal-17-million-worth-of-nfts.html
Read: https://thehackernews.com/2022/02/hackers-steal-17-million-worth-of-nfts.html
Researchers uncover 25 malicious JavaScript libraries that attackers distributed via the NPM package repository with the aim of stealing Discord tokens and environment variables from compromised systems.
Read details: https://thehackernews.com/2022/02/25-malicious-javascript-libraries.html
Read details: https://thehackernews.com/2022/02/25-malicious-javascript-libraries.html
β οΈWARNING!
9-year-old UNPATCHED vulnerability has been uncovered in Horde webmail software that can be exploited to gain full access to email accounts simply by previewing attachments.
Details: https://thehackernews.com/2022/02/9-year-old-unpatched-email-hacking-bug.html
9-year-old UNPATCHED vulnerability has been uncovered in Horde webmail software that can be exploited to gain full access to email accounts simply by previewing attachments.
Details: https://thehackernews.com/2022/02/9-year-old-unpatched-email-hacking-bug.html
π₯ Chinese researchers reveal details of a 'top-tier' backdoor, dubbed "Bvp47," used by the Equation Group, an APT group linked to the U.S. National Security Agency's cyber-warfare intelligence unit.
Read details: https://thehackernews.com/2022/02/chinese-experts-uncover-details-of.html
Read details: https://thehackernews.com/2022/02/chinese-experts-uncover-details-of.html
Researchers discover similarities between the Dridex malware and a little-known ransomware strain called Entropy, suggesting that the operators continue their extortion operations under a different name.
Read details: https://thehackernews.com/2022/02/dridex-malware-deploying-entropy.html
Read details: https://thehackernews.com/2022/02/dridex-malware-deploying-entropy.html
β‘ U.S. and U.K. cybersecurity agencies have issued an urgent warning about a new Russian botnet malwareβ β dubbed "Cyclops Blink"β β which Sandworm hackers built from hacked firewall and router devices.
Details: https://thehackernews.com/2022/02/us-uk-agencies-warn-of-new-russian.html
Details: https://thehackernews.com/2022/02/us-uk-agencies-warn-of-new-russian.html
β‘1
U.S. cybersecurity agency CISA is warning companies about two actively exploited vulnerabilities affecting the widely used open-source Zabbix enterprise monitoring platform.
β CVE-2022-23131
β CVE-2022-23134
Details: https://thehackernews.com/2022/02/cisa-alerts-on-actively-exploited-flaws.html
β CVE-2022-23131
β CVE-2022-23134
Details: https://thehackernews.com/2022/02/cisa-alerts-on-actively-exploited-flaws.html
Deadbolt ransomware malware is now targeting ASUSTOR's network-attached storage (NAS) devices.
Cybercriminals claim to be exploiting a zero-day vulnerability that the company is not aware of.
Read details: https://thehackernews.com/2022/02/warning-deadbolt-ransomware-targeting.html
Cybercriminals claim to be exploiting a zero-day vulnerability that the company is not aware of.
Read details: https://thehackernews.com/2022/02/warning-deadbolt-ransomware-targeting.html
Researchers share latest findings on TrickBot malware campaign, suggesting that the group is probably switching its operations to move to a new malware.
Read details: https://thehackernews.com/2022/02/trickbot-gang-likely-shifting.html
Read details: https://thehackernews.com/2022/02/trickbot-gang-likely-shifting.html
A set of 4 new vulnerabilities have been discovered in Cisco's NX-OS network operating system for switches that attackers can exploit to take control of affected systems.
https://thehackernews.com/2022/02/new-flaws-discovered-in-ciscos-network.html
Affected organizations are advised to apply latest patches ASAP.
https://thehackernews.com/2022/02/new-flaws-discovered-in-ciscos-network.html
Affected organizations are advised to apply latest patches ASAP.
A set of 4 new vulnerabilities have been discovered in Cisco's NX-OS network operating system for switches that attackers can exploit to take control of affected systems.
https://thehackernews.com/2022/02/new-flaws-discovered-in-ciscos-network.html
Affected organizations are advised to apply latest patches ASAP.
https://thehackernews.com/2022/02/new-flaws-discovered-in-ciscos-network.html
Affected organizations are advised to apply latest patches ASAP.
Notorious Trickbot malware group has officially shut down its botnet infrastructure after reports of its imminent retirement amid a lull in its activity for almost two months.
Read details: https://thehackernews.com/2022/02/notorious-trickbot-malware-gang-shuts.html
Read details: https://thehackernews.com/2022/02/notorious-trickbot-malware-gang-shuts.html
Russian government warns domestic critical infrastructure operators of potential cyberattacks as the country's invasion of Ukraine enters its second day.
Read: https://thehackernews.com/2022/02/putin-warns-russian-critical.html
Read: https://thehackernews.com/2022/02/putin-warns-russian-critical.html
Researchers discover a new stealth malware, dubbed SockDetour, that operates filelessly and socketlessly on compromised systems and serves as a backup backdoor in case the primary one is removed.
Read details: https://thehackernews.com/2022/02/new-sockdetour-fileless-socketless.html
Read details: https://thehackernews.com/2022/02/new-sockdetour-fileless-socketless.html
π±1