Singapore and the U.S. signed several Memorandums of Understanding (MOUs) to expand their cybersecurity cooperation in areas such as defense, banking, and research and development, according to ZDNet. These activities include increased information sharing, team building, training and skills development. Three MOUs show more ...
were signed on Monday during the US' three-day visit to Asia Vice President Kamala Harris. One was an agreement between Singapore and the U.S. Cyber Security and Infrastructure Security Agency (CISA) aimed at expanding the cybersecurity partnership beyond data sharing and exchange. Both government agencies will explore new areas of cooperation, such as important technological research and development. The first MOU will allow both partners to strengthen existing partnerships between the countries so that they are able to work clo... (read more)
Researchers identified 4 new ransomware gangs that are targeting businesses and key infrastructure, according to The Hacker News. Ransomware attacks nowadays did not only increase in frequency and intensity, but went beyond financial gain, posing a threat to the national security of firms, hospitals, schools, and show more ...
governments worldwide. Palo Alto Networks' Unit 42 threat intelligence team notes "While the ransomware crisis appears poised to get worse before it gets better, the cast of cybercrime groups that cause the most damage is constantly changing". While we did not hear too much of them lately compared to previous years, Unit 42 says this is just the calm before the storm. Let's explore the latest ransomware kits on the market and the groups behind them. AvosLocker AvosLocker is a late-June ransomware company that exploits press announce... (read more)
A customized version of the WhatsApp Messaging App for Android has been found to display full-screen advertising, register device users for unwanted premium subscriptions without their agreement and deliver dangerous payloads, says The Hacker News. Generally speaking, modifications of legitimate Android apps are show more ...
launched to perform functions that were not originally intended. For instance, you can customize icons, disable video calls, add themes or hide features like Recently Seen with FMWhatsApp. Then again, not all mods are launched with good intentions and this is another case of why you should be wary of too-good-to-be-true free services. The FMWhatsApp version discovered by
The hacker known as Mr. White found a way to resolve one of the biggest cryptocurrency thefts of all time, according to CNBC. Earlier this week, Poly Network, a decentralized financial network, announced that about $600 million in bitcoin had been stolen from its vaults due to a coding error. The sum was changed show more ...
immediately to other cryptocurrencies, namely a total of $273 million in Ethereum tokens, $253 million in Binance Smart Chain tokens, and $85 million in USDC. Surprisingly, the thief known as Mr. White Hat, began recovering assets almost shortly after the discovery and distributed t... (read more)
We recently discovered that a version of popular WhatsApp mod FMWhatsApp includes an embedded Trojan. The Trojan, called Triada, downloads other malware to users’ devices. Here’s how it happened and why using modified versions of WhatsApp is dangerous. Why use WhatsApp mods? Not all users are happy with show more ...
the official WhatsApp app. Some may feel a need for self-destructing messages or, conversely, the ability to view messages another user deleted. Others are after dynamic themes, and still others want to hide certain chats from the general list or automatically translate messages. Naturally, they want these features right away, not when WhatsApp’s developers finally get around to implementing them. As a result, some users turn to the modified WhatsApp clients available online, which are fairly numerous and not hard to find. Fans of mods are not deterred even by WhatsApp’s occasional crackdown on such modifications or the threat of account bans. The creators of WhatsApp mods often embed ads in them — understandably — along with the features users are looking for. Problems arise, however, from their use of third-party ad modules through which malicious code can sneak in under developers’ radar. Triada et al. in the FMWhatsApp mod That’s precisely what happened with FMWhatsApp, a popular WhatsApp mod. In version 16.80.0 the developers use third-party ad module that includes a Trojan. Our mobile antivirus solution detects this malware as Trojan.AndroidOS.Triada.ef. We saw a similar situation in the spring of 2021 with the APKPure unofficial app store, whose developers also used an ad module from an unverified source, thereby infecting their creation, and consequently users, with the Triada Trojan (albeit a slightly different version). As in the case of the infected APKPure, the Triada Trojan in the dangerous version of the FMWhatsApp mod performs an intermediary function. First, it collects data about the user’s device, and then, depending on the information, it downloads another Trojan. Triada’s “extras” come in a variety of flavors — the infected version of FMWhatsApp downloads several types of malware to devices: Trojan-Downloader.AndroidOS.Agent.ic, a Trojan that downloads and runs other malicious modules; Trojan-Downloader.AndroidOS.Gapac.e, which downloads and runs other malicious modules and can also display full-screen ads at unexpected moments; Trojan-Downloader.AndroidOS.Helper.a, which downloads and runs the installer module of the xHelper Trojan and runs invisible ads in the background; Trojan.AndroidOS.MobOk.i, a Trojan that signs up for paid subscriptions; Trojan.AndroidOS.Subscriber.l, another Trojan that signs up for paid subscriptions; Trojan.AndroidOS.Whatreg.b, the most complex Trojan in the list, signs in to the WhatsApp account on the victim’s phone, intercepting the login confirmation text. The device can then become a site for various types of illegal activity such as spam distribution or illegal trading. Our Securelist post delves more into the FMWhatsapp mod’s Triada Trojan. How to defend against such attacks Practicing caution and using your device safely is key to keeping malware and other mobile nasties off your phone. Generally speaking, follow these tips to avoid trouble: Avoid installing apps from unofficial sources and use your device’s settings to deny permission to install them. (If you need to install an app not from an official store, temporarily enable that permission and then disable it again); Use only official messaging apps, and download them only from official app stores — they may lack some features, but will not flood your phone with viruses; Check what permissions you’ve granted to installed apps — some might pose a real threat; Install a reliable mobile antivirus app on your phone, and heed its warnings.
Less than a year after raising its $6 million seed funding round, Tel Aviv and Sunnyvale-based startup build.security is being acquired by Elastic. The financial terms of the deal were not disclosed.
The vulnerability allowed the threat actor to distribute a malicious document through a remote Cloudflare worker but make it look like it was being downloaded directly from UPS.com.
The Nokia subsidiary discovered that its network was breached by Conti ransomware operators on June 16, only after deploying their payloads and encrypting SAC Wireless systems.
Iranian APT Lyceum has been disguising as HR managers and employees of well-known firms to compromise the networks of IT and communication firms in Israel, since 2018. The threat actor carried out several waves of attacks using several tools, malware, and malicious documents. Security professionals are urged to keep a strict watch on the development of the Lyceum group.
Apple Inc CEO Tim Cook and Microsoft Corp Chief Executive Satya Nadella will also attend the White House cybersecurity event, Bloomberg News reported on Monday, citing sources.
Security firm SAM Seamless Network discovered that a Mirai botnet began searching for devices unpatched against the flaw on August 18, only two days after IoT Inspector shared details of the bug.
Specifically, some of the remaining funds were held in a wallet that could only be unlocked with the hacker's help; the private key needed to access those funds was given up to Poly some hours ago.
Researchers at Mnemonics Labs have found a vulnerability (CVE-2021-34749) in the server name indication, or SNI, of the TLS Client Hello extension used to perform TLS inspection.
New ransomware group LockFile has been discovered using the PetitPotam NTLM relay attack method to take over a Windows domain completely. The adoption of the recently discovered PetitPotam attack into their campaign indicates that hackers are actively working to enhance the malware. Furthermore, researchers noted that the ransom note by the group appears similar to that of the LockBit ransomware group.
Kubescape is an open-source tool that helps organizations test if Kubernetes is deployed securely, as defined in the recently released Kubernetes Hardening Guidance by NSA and CISA.
Cybercriminals are increasingly deploying CAPTCHA-protected malicious URLs to bypass security walls while adding counterfeit login for lottery and survey pages. Targeted victims are baited into revealing their information, such as addresses, date of births, banking information, and annual income. Such phishing pages show more ...
can be detected with the association of CAPTCHA identifiers that can be used as IOCs to detect such attacks.
Silent video footage capturing the dire conditions of life inside Tehran's Evin Prison were shared with the media on Sunday by hacktivist group Tapandegan (Palpitations).
In terms of the new guidelines for payment gateways and payment aggregators, online merchants will not be able to store credit card data, forcing customers to enter their 16-digit numbers manually.
This cyberespionage campaign uses previously unidentified shellcode loaders, which we have named StealthVector and StealthMutant, and a backdoor, which we have dubbed ScrambleCross.
A security researcher discovered that it was quite easy to trigger a vulnerability in WebAdmin of SG UTM, an attacker could exploit the flaw by sending an HTTP request to vulnerable devices.
Data breaches like ransomware can be catastrophic for some businesses. Not only do affected organizations lose revenue from the downtime, but the post-breach costs can also be significant.
The FBI has shared info about a threat actor known as OnePercent Group that has been actively targeting US organizations since at least November 2020 as a ransomware affiliate.
Australia's data protection regulator says organizations hit by ransomware may be underreporting data breaches because they haven't thoroughly figured out if data was taken.
The malware campaign’s modus operandi involves social engineering techniques such as luring the victim into downloading a document file weaponized with a malicious macro.
The funding comes from a variety of pro-Linux and open-source organizations, including Google, Microsoft, OpenSSF, the LF Public Health foundation, and the Linux Foundation itself.
Chief among the new entrants is AvosLocker, a RaaS group that commenced operations in late June via "press releases" that are branded with a blue beetle logo to recruit new affiliates.
According to a report published by PhishLabs, 54% of attacks in the cryptocurrency industry came from threat actors impersonating brands, employees, and executives on social media.
The hackers changed their obfuscation and encryption techniques every 37 days. This implies that the gang is highly motivated and possesses sophisticated detection evasion mechanisms.
Researchers found that an attacker with access to a health care facility's network could take control of B. Braun SpaceStation by exploiting a common connectivity vulnerability.
Digital threat researchers at Citizen Lab have uncovered a new zero-click iMessage exploit used to deploy NSO Group's Pegasus spyware on devices belonging to Bahraini activists.
Upstream's Series C funding was led by Mitsui Sumitomo Insurance and was joined by new investors I.D.I. Insurance, 57 Stars’ NextGen Mobility Fund, and La Maison Partners.
Threat actors can evade detection using filename matching by renaming the binary executable, as the side-loading technique will remain viable regardless of the name of the executable.
According to an advisory by Zoom on August 13, the most severe of the flaws leveraged in this exploit chain, tracked as CVE-2021-34407, was patched in the Zoom Client for Meetings version 5.6.3.
The first six months of 2021 saw a significant increase in the volume and sophistication of attacks targeting individuals, organizations, and increasingly critical infrastructure.
Once the app is launched, the malware gathers unique device identifiers (Device IDs, Subscriber IDs, MAC addresses) and the name of the app package where they’re deployed.
Hunters, which has offices in Newton, Mass. and Tel Aviv, Israel, was founded in 2018 and has raised a total of $50.4 million to date. Its latest round was led by Bessemer Venture Partners (BVP).
The company doesn’t think it was the intent of the hacker to release patients’ medical information but rather as a way to launch more sophisticated phishing email attacks on other Revere employees.
According to the latest telemetry by Trend Micro, researchers revealed that they had detected multiple LockBit 2.0 attack attempts in Chile, Italy, Taiwan, and the U.K.
Recent studies on the FluBot banking malware confirmed that there has been a spike in the number of malicious distribution pages affecting a number of Australian, Polish, and German banks.
OpenSSL is a robust, fully featured Open Source toolkit implementing the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols with full-strength cryptography world-wide.
Ubuntu Security Notice 5050-1 - It was discovered that the bluetooth subsystem in the Linux kernel did not properly perform access control. An authenticated attacker could possibly use this to expose sensitive information. Michael Brown discovered that the Xen netback driver in the Linux kernel did not properly handle show more ...
malformed packets from a network PV frontend, leading to a use-after-free vulnerability. An attacker in a guest VM could use this to cause a denial of service or possibly execute arbitrary code. Various other issues were also addressed.
More than 38 million records from 47 different entities that rely on Microsoft's Power Apps portals platform were inadvertently left exposed online, bringing into sharp focus a "new vector of data exposure." "The types of data varied between portals, including personal information used for COVID-19 contact tracing, COVID-19 vaccination appointments, social security numbers for job applicants,
A modified version of the WhatsApp messaging app for Android has been trojanized to serve malicious payloads, display full-screen ads, and sign up device owners for unwanted premium subscriptions without their knowledge. "The Trojan Triada snuck into one of these modified versions of the messenger called FMWhatsApp 16.80.0 together with the advertising software development kit (SDK),"
A previously undisclosed "zero-click" exploit in Apple's iMessage was abused by Israeli surveillance vendor NSO Group to circumvent iOS security protections and target nine Bahraini activists. "The hacked activists included three members of Waad (a secular Bahraini political society), three members of the Bahrain Center for Human Rights, two exiled Bahraini dissidents, and one member of Al Wefaq
Cybersecurity researchers on Tuesday took the wraps off four up-and-coming ransomware groups that could pose a serious threat to enterprises and critical infrastructure, as the ripple effect of a recent spurt in ransomware incidents show that attackers are growing more sophisticated and more profitable in extracting payouts from victims. "While the ransomware crisis appears poised to get worse