Did that Ransomware Spread Through TeamV...

Hi everybody, A TeamViewer user is allegedly propagating ransomware. TeamViewer is a cross-platform service that enables remote computer access for tech support calls, meetings, and other purposes and has been installed in over billion devices. On a forum called Bleeping Computer, a thread described the encrypted pictures videos, and PDFs, the infected victims received with the “.surprise” extension concatenated to every affected filename. An infected user has mentioned that the “Surprise” ransomware downloaded three files onto their computers. One of the files...

Apple’s iMessage Encryption Can Be Bro...

Hi guys, A zero-day vulnerability in Apple’s iOS encryption has been discovered by a team of researchers headed by  professor Matthew Green  at the Johns Hopkins University. This flaw could allow attackers to decrypt intercepted iMessages. But a lot of details about the flaw has not been shared yet. The company has said that in iOS9 the flaw has been partially fixed but will be completely removed in iOS 9.3 on Monday (today). The researchers  managed to successfully execute an attack targeting iPhones that are still not using the latest version of the mobile OS. For...

Who’s Affected by Snapdragon Vulnerabi...

Hello everybody, Qualcomm Snapdragon SoCs (systems on a chip) power more than a billion smart devices that are in use today. But most of Snapdragon modems and processes were found to have security flaws that could allow an attacker to gain root access. Vulnerabilities that affect Android devices powered by Snapdragon have been recently discovered and were fixed by Google. These vulnerabilities if exploited could give root access on the target device simply by running a malicious app. Due to the fragmented nature of vulnerability patching in the mobile and Internet of...

Polymorphic Malware...

Hi guys In 2015, security experts at Webroot have scanned over 27 billion URLs, 600 million domains, 4 billion IP addresses, 20 million mobile apps, 10 million connected sensors, and took a look over 9 billion file behaviour records. They found that 97% of all detections, malware is unique to the system it infects, even if, at its core, in many infections, it’s the same malware variant. A technique called polymorphism is used by malware operators to alter the malware’s binaries in a way to generate unique executables. This is not a new technique and is usually...

“Operation Dust Storm” Research...

Hello everybody ! New Security Research from Cylance SPEAR™ Team Uncovers Multi-Year, Multi-Attack Campaign Targeting Japanese Critical Infrastructure. Cylance SPEAR™ team, the security research arm of Cylance, recently released a report titled “Operation Dust Storm,” which reveals a multi-year, multi-attack campaign against Japanese commercial interests and critical infrastructure. This research states the stability of the threat group that is likely associated with a nation/state, and how it has used numberous attack vectors and techniques to breach companies...

Powerpoint Presentation Used As Phishing...

Hi guys, Recently a Phishing attack which uses PowerPoint Custom Actions instead of macros to execute a malicious payload has been discovered. Using PowerPoint attachments in phishing attacks is not new, but these attacks in particular can bypass controls that assert on macro enabled Office attachments. This is how it happens –  An attacker creates a new PowerPoint presentation and inserts a malicious script/executable. The inserted file is embedded as an OLE object. Then a Custom Action is created set to trigger ‘With Previous’ with the actionfigur ‘Activate...

German Police uses a ‘Federal Trojan...

Hallo Bundestrojaner stands for “Federal Trojan,” in German. This  malware family is the first created by the government to be deployed against its own citizens. In 2011, there was a controversy against The trojan when the German-based Chaos Computer Club (CCC) discovered that Bundestrojaner, also known as R2D2, included more spying capabilities than initially announced by German authorities and what the German constitution allowed. The first version of Bundestrojaner was developed to enable police officers to tap into Internet and telephony communications,...

Linux Mint ISO Modified by Hackers...

Hi all Linux users! Linux Mint ISO has been modified by hackers with a backdoor in it, and they have managed to hack the LinuxMint website. The only compromised edition was Linux Mint 17.3 Cinnamon edition. If you downloaded another release or another edition, this does not affect you. If you downloaded via torrents or via a direct HTTP link, this doesn’t affect you either. Ideally, it should only impact people who downloaded this edition on February 20th. If you still have the ISO file, check its MD5 signature with the command “md5sum yourfile.iso” (where...

Insufficient Funding for Cyber Security ...

Hello everybody Hundreds of security startups have sprung up in recent years, promising cutting-edge solutions for their customers. But new ventures have struggled to gain traction. “Investors are looking at balance sheets and saying, ‘You raised $100 million and you have nothing to show for it?’” said Promod Haque, senior managing partner at Norwest Venture Partners, which manages about $6 billion in capital. CB insights have shown that Private investors pumped a record $3.3 billion into 229 cyber security deals last year, but Venture...

Anonymous Hacks French Defense Ministry ...

Hello folks! A  Web portal managed by France’s Ministry of Defense was hacked by Anonymous. They leaked the site’s database to protest against the country’s intensive foreign arms trade operations. The Anonymous hackers, targeted one of the Ministry’s smaller sites, the CIMD (Centre d’Identification des Materiels de la Defense) portal. A few hours afterwards the website was taken offline with a display message ” Our web portal will be temporarily unavailable due to maintenance actions.” Anonymous hacked the database, gained...

« Previous Entries