Menu

Blog

Archive for the ‘cybercrime/malcode’ category: Page 12

Oct 5, 2024

New Perfctl Malware Targets Linux Servers for Cryptocurrency Mining and Proxyjacking

Posted by in categories: cryptocurrencies, cybercrime/malcode, internet

“When a new user logs into the server, it immediately stops all ‘noisy’ activities, lying dormant until the server is idle again. After execution, it deletes its binary and continues to run quietly in the background as a service.”

It’s worth noting that some aspects of the campaign were disclosed last month by Cado Security, which detailed an activity cluster that targets internet-exposed Selenium Grid instances with both cryptocurrency mining and proxyjacking software.

Specifically, the fileless perfctl malware has been found to exploit a security flaw in Polkit (CVE-2021–4043, aka PwnKit) to escalate privileges to root and drop a miner called perfcc.

Oct 5, 2024

Cloudflare Thwarts Largest-Ever 3.8 Tbps DDoS Attack Targeting Global Sectors

Posted by in category: cybercrime/malcode

Cloudflare mitigates a record-breaking 3.8 Tbps DDoS attack, marking a surge in global cyber threats.

Oct 3, 2024

Terrifying Smart Glasses Hack Can Pull Up Personal Info of Nearby Strangers in Seconds

Posted by in categories: cybercrime/malcode, robotics/AI

A pair of Harvard students successfully rigged Meta-formerly-Facebook and Ray Ban’s smart glasses with facial recognition software.

Sep 30, 2024

UK data watchdog confirms it’s investigating MoneyGram data breach

Posted by in category: cybercrime/malcode

The world’s second-largest money transfer provider, which filed a data breach notice with U.K. authorities, serves over 50 million people.

Sep 25, 2024

Necro Android Malware Found in Popular Camera and Browser Apps on Play Store

Posted by in categories: cybercrime/malcode, mobile phones

Necro malware infects 11 million Android devices via apps on Google Play, using steganography to evade detection.

Sep 25, 2024

Cybersecurity Researchers Warn of New Rust-Based Splinter Post-Exploitation Tool

Posted by in category: cybercrime/malcode

Unit 42 reveals the discovery of Splinter, a new Rust-based post-exploitation tool posing cybersecurity risks.

Sep 23, 2024

Hacktivist Group Twelve Targets Russian Entities with Destructive Cyber Attacks

Posted by in categories: cybercrime/malcode, finance

Twelve hacktivist group targets Russian entities with destructive cyber attacks, using public tools for maximum damage without financial gain.

Sep 23, 2024

New PondRAT Malware Hidden in Python Packages Targets Software Developers

Posted by in category: cybercrime/malcode

North Korean hackers use poisoned Python packages from PyPI to spread PondRAT malware, targeting developers in a supply chain attack.

Sep 23, 2024

Global infostealer malware operation targets crypto users, gamers

Posted by in categories: cryptocurrencies, cybercrime/malcode, finance

A massive infostealer malware operation encompassing thirty campaigns targeting a broad spectrum of demographics and system platforms has been uncovered, attributed to a cybercriminal group named “Marko Polo.”

The threat actors use a variety of distribution channels, including malvertising, spearphishing, and brand impersonation in online gaming, cryptocurrency, and software, to spread 50 malware payloads, including AMOS, Stealc, and Rhadamanthys.

According to Recorded Future’s Insikt Group, which has been tracking the Marko Polo operation, the malware campaign has impacted thousands, with potential financial losses in the millions.

Sep 23, 2024

Dell investigates data breach claims after hacker leaks employee info

Posted by in category: cybercrime/malcode

Dell has confirmed to BleepingComputer that they are investigating recent claims that it suffered a data breach after a threat actor leaked the data for over 10,000 employees.

The allegations were published yesterday by a threat actor named “grep,” who alleges that the computing vendor suffered a “minor data breach” in September 2024, exposing internal employee and partner information.

In a post to a hacking forum, the threat actor says the stolen data includes employees’ unique identifiers, full names of employees for Dell and partners, status of employees (active or not), and an internal identification string.

Page 12 of 224First910111213141516Last