Researchers detail DarkTortilla, an evasive crypter used by hackers to spread a broad array of commodity malware and targeted payloads such as Cobalt Strike and Metasploit, likely since 2015.
Read details: https://thehackernews.com/2022/08/researchers-detail-evasive-darktortilla.html
Read details: https://thehackernews.com/2022/08/researchers-detail-evasive-darktortilla.html
π3
Researchers have discovered a new high-severity vulnerability in the Amazon Ring app for Android, allowing rogue apps to access sensitive information.
Read details: https://thehackernews.com/2022/08/new-amazon-ring-vulnerability-could.html
Read details: https://thehackernews.com/2022/08/new-amazon-ring-vulnerability-could.html
π10
Google says it has fended off the largest ever HTTPS-based distributed denial of service (DDoS) attack to date, which peaked at 46 million requests per second.
Read details: https://thehackernews.com/2022/08/google-cloud-blocks-record-ddos-attack.html
Read details: https://thehackernews.com/2022/08/google-cloud-blocks-record-ddos-attack.html
π€―14π₯3π1
An ongoing wave of malware attacks targeting hospitality, hotel, and travel organizations has been tied to a financially motivated cybercrime group.
Read details: https://thehackernews.com/2022/08/cybercrime-group-ta558-targeting.html
Read details: https://thehackernews.com/2022/08/cybercrime-group-ta558-targeting.html
π8π₯1
CISA has updated its Known Exploited Vulnerabilities Catalog with 7 new vulnerabilities based on evidence of active exploitation.
Read details: https://thehackernews.com/2022/08/cisa-adds-7-new-actively-exploited.html
CVE-2017-15944, CVE-2022-21971, CVE-2022-26923, CVE-2022-2856, CVE-2022-32893, CVE-2022-32894, CVE-2022-22536
Read details: https://thehackernews.com/2022/08/cisa-adds-7-new-actively-exploited.html
CVE-2017-15944, CVE-2022-21971, CVE-2022-26923, CVE-2022-2856, CVE-2022-32893, CVE-2022-32894, CVE-2022-22536
π6π₯2
A new Grandoreiro banking trojan campaign has been spotted targeting manufacturers in Spanish-speaking countries such as Spain and Mexico.
Read details: https://thehackernews.com/2022/08/new-grandoreiro-banking-malware.html
Read details: https://thehackernews.com/2022/08/new-grandoreiro-banking-malware.html
π11π€―3
Researchers have uncovered multiple vulnerabilities in ultra-wideband (UWB) real-time location systems (RTLS) that allow threat actors to launch adversary-in-the-middle (AitM) attacks and manipulate location data.
Read details: https://thehackernews.com/2022/08/rtls-systems-found-vulnerable-to-mitm.html
Read details: https://thehackernews.com/2022/08/rtls-systems-found-vulnerable-to-mitm.html
π19π€―1
Researchers have discovered counterfeit Android phones of popular smartphone brands are pre-infected with multiple trojans designed to target WhatsApp and WhatsApp Business.
Read details: https://thehackernews.com/2022/08/researchers-find-counterfeit-phones.html
Read details: https://thehackernews.com/2022/08/researchers-find-counterfeit-phones.html
π19π€―3
U.S. cybersecurity agency CISA warns of active exploitation of a high-severity reflected/amplified DoS attack vulnerability (CVE-2022-0028) in Palo Alto Networks' PAN-OS.
Read details: https://thehackernews.com/2022/08/cisa-warns-of-active-exploitation-of.html
Read details: https://thehackernews.com/2022/08/cisa-warns-of-active-exploitation-of.html
π25π±5π4π₯2π1
Researchers have developed a new Air-Gap attack in which attackers can exfiltrate sensitive information from air-gapped computers to smartphones located a few meters away via Speakers-to-Gyroscope covert channel.
Details: https://thehackernews.com/2022/08/new-air-gap-attack-uses-mems-gyroscope.html
Details: https://thehackernews.com/2022/08/new-air-gap-attack-uses-mems-gyroscope.html
π30π±28π€3π2π₯1
Iranian hackers (UNC3890) have been linked to a series of attacks aimed at Israeli shipping, government, energy, and healthcare organizations as part of an espionage-focused campaign.
Read details: https://thehackernews.com/2022/08/suspected-iranian-hackers-targeted.html
Read details: https://thehackernews.com/2022/08/suspected-iranian-hackers-targeted.html
π60π€―15π11π₯9π±6π€3
Hackers have updated the nasty XCSSET malware to add support for macOS Monterey by updating the source code components to Python 3.
Read details: https://thehackernews.com/2022/08/xcsset-malware-updates-with-python-3-to.html
Read details: https://thehackernews.com/2022/08/xcsset-malware-updates-with-python-3-to.html
π₯27π19π€―11π5π±5π€2
Google reveals a new malicious tool used by Iranian government-backed hackers to retrieve user data from compromised Gmail, Yahoo! and Microsoft Outlook accounts.
Read details: https://thehackernews.com/2022/08/google-uncovers-tool-used-by-iranian.html
Read details: https://thehackernews.com/2022/08/google-uncovers-tool-used-by-iranian.html
π45π₯24π±16π€―13π€8π4
DevOps platform GitLab releases patches to fix a critical vulnerability in its software that could lead to the execution of arbitrary code on affected systems.
Read details: https://thehackernews.com/2022/08/gitlab-issues-patch-for-critical-flaw.html
Read details: https://thehackernews.com/2022/08/gitlab-issues-patch-for-critical-flaw.html
π€―32π23π₯7π±5
Researchers discovered another large-scale adversary-in-the-middle (AiTM) campaign targeting Google Workspace enterprise users with advanced phishing kits that bypass multi-factor authentication.
Read details: https://thehackernews.com/2022/08/researchers-warn-of-aitm-attack.html
Read details: https://thehackernews.com/2022/08/researchers-warn-of-aitm-attack.html
π30π€―14π₯7π±5π€1
Researchers uncover a widespread campaign in which hackers use compromised WordPress sites to display fraudulent Cloudflare DDoS protection pages and spread malware such as NetSupport RAT and Raccoon Stealer.
Details: https://thehackernews.com/2022/08/hackers-using-fake-ddos-protection.html
Details: https://thehackernews.com/2022/08/hackers-using-fake-ddos-protection.html
π19π14π±11π€―8π5
Researchers have demonstrated a new AIR-GAP data exfiltration technique in which malware uses network interface card (NIC) LEDs to transmit covert Morse code signals that can be decoded from tens to hundreds of meters away.
Read details: https://thehackernews.com/2022/08/air-gapped-devices-can-send-covert.html
Read details: https://thehackernews.com/2022/08/air-gapped-devices-can-send-covert.html
π€―45π19π₯8π±7π4
A growing number of cybercriminals have begun using the peer-to-peer instant messaging service Tox as a command-and-control method for cryptocurrency mining #malware.
Read: https://thehackernews.com/2022/08/crypto-miners-using-tox-p2p-messenger.html
Read: https://thehackernews.com/2022/08/crypto-miners-using-tox-p2p-messenger.html
π±38π€12π10π₯9π5π€―5π1
PyPI repository has sounded the alarm about an ongoing phishing campaign aimed at stealing developers' credentials and injecting malicious updates into legitimate Python packages.
Read details: https://thehackernews.com/2022/08/pypi-repository-warns-python-project.html
Read details: https://thehackernews.com/2022/08/pypi-repository-warns-python-project.html
π38π€―11π₯9π€6
Microsoft uncovered βMagicWeb,β a new "highly-targeted" post-exploitation malware used by the Nobelium APT hackers to maintain persistent access to compromised environments.
Read details: https://thehackernews.com/2022/08/microsoft-uncovers-new-post-compromise.html
Read details: https://thehackernews.com/2022/08/microsoft-uncovers-new-post-compromise.html
π29π€―7π₯6π±2