Google has released an emergency security update for Google Chrome, as the company is patching a 0-day vulnerability in the browser. While not too many specifics have been offered, the vulnerability is already being exploited in the wild, with Google obviously urging its users to install the latest update as soon as show more ...
possible. The new version is Chrome 103.0.5060.114, and if you want to install it today, simply check for updates in the browser’ settings page. According to Google itself, the new browser update comes to resolve three different security vulnerabilities, all of which are rated with a high severity rating. High CVE-2022-2294: Heap buffer overflow in WebRTC. Reported by Jan Vojtesek from the Avast Threat Intelligence team on 2022-07-01 High CVE-2022-2295: Type Confusion in V8. Reported by avaue and Buff3tts at S.S.L. on 2022-06-16 High CVE-2022-2296: Use after free in Chrome OS Shell. Reported by Khalil Zhani on 2022-05-19
Online scammers use all sorts of ways to separate cryptoinvestors from their prized bitcoin. They create fake news sites and promise helicopter money. They even post screenshots in Lightshot with cryptowallet login credentials — this being a trap for folks who have a weakness for other folks secrets and a free lunch. show more ...
We recently uncovered a new scheme in which YouTube users are lured to a fake cryptoexchange through videos about a bug that supposedly lets them take advantage of a huge discrepancy in exchange rates. The cryptocurrency exchange rate bug Just like traditional currencies, cryptocurrencies exchange rates are determined by the market: as of the writing of this post, one bitcoin is worth around 18 Ethereum on average. But exchange rates may vary between the different platforms where these currencies are traded. The differences are usually small, but what if one of the platforms has a technical glitch that works to buyers advantage? Then it could be those buyers lucky day, and they might strike it rich thanks to the discrepancy in exchange rates. Finding a bug like this is a dream for freebie lovers — and this is exactly what the scammers are promising in videos on YouTube. Using YouTube comments to build hype The first thing the fraudsters do is create a YouTube channel where they post videos describing a clever way to get rich, which they want to share with the cryptocommunity. One of the fraudulent YouTube channels used in this scheme — with just one video posted on the channel In the single video on the channel, the scammers claim that theyve found a bug in one of the automated exchanges: by some happy turn of events, the exchange buys one bitcoin for 184 Ethereum, while on Binance the exchange rate is 18.4. That means that you should get 10 times more money on this website, all because of a vanishing decimal point. In their video, the scammers show an error they allegedly found in the BTC-to-ETH exchange rate To get users excited and steer them away from fact-checking, the fraudsters pad the comments section with bot-posts expressing the deepest of gratitude for the amazing insider knowledge. Fake comments under a video by users who suddenly struck it rich To promote their channel, the scammers go to popular videos made by other people — these are often newly posted ones where the comments section is the most active — and leave comments talking about a bug on a cryptoexchange and recommending a video about it. To make sure the comments dont get lost among others, the bots give them lots of likes. Scammers comments with tons of likes under another creators popular video Directing users to the website The link to the website with the allegedly favorable exchange rate is provided for those who are interested. You guessed it: this website is also run by the scammers. Website of a fake cryptocurrency exchange When they try to sell their crypto on this website, victims see a message saying that the rate is good for only 180 minutes. During that time, victims are asked to transfer the bitcoin they want to sell for Ethereum to a specific cryptowallet address. If the victim sends the bitcoin, they go to the criminals — who of course dont send back any Ethereum in return. A fake cryptoexchange page The described website isnt the only one of its kind: fraudsters are creating dozens of fake cryptoexchanges and YouTube channels for other cryptocurrencies too. The cybercriminals are probably banking on the fact that users will seek out information about the tokens theyre interested in. The website names and addresses may be different, but in every case the scam revolves around a bug in an exchange rate. A bunch of similar fraudulent videos in a YouTube search How to protect yourself As always, your most powerful weapon in combating cybercriminals is vigilance. Always be wary if youre offered something for free, or if you see a deal that looks too good to be true. Ask yourself why someone would want to share that pot of gold with you. If anyone asks you to send funds somewhere, do your homework and check where theyd be going. If youre not confident that the recipient is legitimate, its best not to take the risk no matter how great the deal looks. And make sure that all the devices you use to handle cryptocurrency have a reliable antivirus that will block malicious software and warn you before you visit a suspicious website.
Steve Barclay, the UK government minister responsible for cybersecurity, claims that “the greatest cyber threat to the UK – one now deemed severe enough to pose a national security threat – is from ransomware attacks.”
Apart from the incorrect URL, which is disguised by the fact that it starts with the text facebook.contact, so it might pass muster if you’re in a hurry, there aren’t any obvious spelling or grammatical errors in the phishing message.
MedusaLocker uses a batch file to execute a PowerShell script, called invoke-Reflective PEInjection. Attacks typically restart machines in safe mode to avoid detection by security software.
To restore all systems as quickly and securely as possible, the authorities are implementing a district closure, suspending the district’s summer activities for the remainder of this holiday week including district field trips.
A new phishing scam, where victims receive an email from the “Division of Transportation” saying that they have committed a traffic offence, has surfaced, the Singapore police said.
The malicious HTML attachments include a link to a phishing site, which, when opened, gets redirected to a third-party machine that requests the users to enter their credentials to access information or download a file that may contain malware.
Geographic Solutions (GSI) was forced to shut down state labor exchanges and unemployment claims systems, and as many as 40 states and Washington DC, all of which rely on GSI's services, could be affected.
As documented by Malwarebytes, the scheme's operators are sending out messages claiming to be from the UK government, offering a free visa and other benefits to individuals willing to move to the country.
Mattax Neu Prater Eye Center announced the breach at the end of June, however, the incident took place in December 2021. According to HIPAA, 92,361 individuals were impacted by the breach.
Google has issued an unexpected update to its Chrome browser to address a zero-day WebRTC flaw that is actively being exploited. The version Chrome 103.0.5060.114 for Windows and Chrome 103.0.5060.71 for Android will release with the fix soon.
The post on the English-speaking hacking forum was spotted by CloudSEK on 7th May 2022 and contained a sample screenshot as proof of their claimed access to a Jenkins dashboard.
In-scope targets include the main Monash University web domain and mobile apps, along with various technologies that are used by the institution, including its VPN and FileShare instances.
The German Federal Office for Information Security (BSI) has put out an IT baseline protection profile for space infrastructure amid concerns that attackers could turn their gaze skywards.
Cyber Europe 2022 involved more than 800 cybersecurity specialists from 29 countries in the EU and the European Free Trade Area (EFTA), as well as EU institutions and agencies.
QuSecure is the only post-quantum product to achieve this status, so it effectively becomes the government’s preferred supplier to counter the ‘harvest now, decrypt later’ threat of future adversarial quantum computing.
While we only tested one decryptor that successfully decrypted files locked in one campaign, other decryptors in the archive are likely designed to decrypt files encrypted in previous campaigns.
A new infostealer, named YTStealer, is targeting content creators on YouTube in an attempt to steal their authentication tokens and take over their accounts. The buyers of the compromised accounts typically use these stolen authentication cookies to hijack YouTube channels for various scams or demand a ransom from the show more ...
actual owners. YouTube creators can consider logging out of their accounts on a regular basis to invalidate any authentication tokens that may have previously been created or stolen.
The recent campaign targets i686 and x86_64 Linux systems. It employs RCE exploits for CVE-2019-2725 (WebLogic) and CVE-2022-26134 (Atlassian Confluence Server and Data Center) for initial access.
Researchers from Kaspersky have named the backdoor SessionManage, which was first spotted the threat in early 2022. It is a native-code module for Microsoft's IIS web server software.
In a recent document, the DoJ said that it pledges to increase “the percentage of reported ransomware incidents from which cases are opened, added to existing cases, or resolved or investigative actions are conducted within 72 hours to 65%.”
The southern Maastricht University in 2019 was hit by a large cyberattack in which criminals used ransomware, a type of malicious software that locks valuable data and can only be accessed once the victim pays a ransom amount.
Federal agencies have been ordered to patch their Linux servers against PwnKit within three weeks. The most astounding part is that it remained hidden for over 12 years since pkexec's first release. Successful exploitation of the flaw could induce pkexec to execute arbitrary code. Organizations are show more ...
recommended to prioritize timely remediation of the issues in order to mitigate any potential risk of exposure to cyberattacks.
OpenSSL is a robust, fully featured Open Source toolkit implementing the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols with full-strength cryptography world-wide. The 3.x series is the current major version of OpenSSL.
OpenSSL is a robust, fully featured Open Source toolkit implementing the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols with full-strength cryptography world-wide.
TripleCross is a Linux eBPF rootkit that demonstrates the offensive capabilities of the eBPF technology. TripleCross is inspired by previous implant designs in this area, notably the works of Jeff Dileo at DEFCON 271, Pat Hogan at DEFCON 292, Guillaume Fournier and Sylvain Afchain also at DEFCON 293, and Kris show more ...
Nóva's Boopkit4. The authors reuse and extend some of the techniques pioneered by these previous explorations of the offensive capabilities of eBPF technology.
Ubuntu Security Notice 5479-2 - USN-5479-1 fixed vulnerabilities in PHP. This update provides the corresponding updates for Ubuntu 16.04 ESM. Charles Fol discovered that PHP incorrectly handled initializing certain arrays when handling the pg_query_params function. A remote attacker could use this issue to cause PHP show more ...
to crash, resulting in a denial of service, or possibly execute arbitrary code. Charles Fol discovered that PHP incorrectly handled passwords in mysqlnd. A remote attacker could use this issue to cause PHP to crash, resulting in a denial of service, or possibly execute arbitrary code.
Lockbit version 3.0 ransomware looks for and executes DLLs in its current directory. Therefore, we can hijack a DLL, in this case "RstrtMgr.dll", execute our own code, and terminate the malware pre-encryption. The exploit DLL checks if the current directory is "C:WindowsSystem32" and if not we grab our show more ...
process ID and terminate. All basic tests were conducted successfully in a virtual machine environment.
The handling of Windows Defender Remote Credential Guard credentials is vulnerable to authentication relay attacks leading to elevation of privilege or authentication bypass.
Google on Monday shipped security updates to address a high-severity zero-day vulnerability in its Chrome web browser that it said is being exploited in the wild. The shortcoming, tracked as CVE-2022-2294, relates to a heap overflow flaw in the WebRTC component that provides real-time audio and video communication capabilities in browsers without the need to install plugins or download native
Change is a part of life, and nothing stays the same for too long, even with hacking groups, which are at their most dangerous when working in complete silence. The notorious REvil ransomware gang, linked to the infamous JBS and Kaseya, has resurfaced three months after the arrest of its members in Russia. The Russian domestic intelligence service, the FSB, had caught 14 people from the gang. In
Cybersecurity researchers have detailed the various measures ransomware actors have taken to obscure their true identity online as well as the hosting location of their web server infrastructure. "Most ransomware operators use hosting providers outside their country of origin (such as Sweden, Germany, and Singapore) to host their ransomware operations sites," Cisco Talos researcher Paul Eubanks
A pro-China influence campaign singled out rare earth mining companies in Australia, Canada, and the U.S. with negative messaging in an unsuccessful attempt to manipulate public discourse to China's benefit. Targeted firms included Australia's Lynas Rare Earths Ltd, Canada's Appia Rare Earths & Uranium Corp, and the American company USA Rare Earth, threat intelligence firm Mandiant said in a
A widespread software supply chain attack has targeted the NPM package manager at least since December 2021 with rogue modules designed to steal data entered in forms by users on websites that include them. The coordinated attack, dubbed IconBurst by ReversingLabs, involves no fewer than two dozen NPM packages that include obfuscated JavaScript, which comes with malicious code to harvest