Cyber security aggregate rss news

Cyber security aggregator - feeds history

image for How can they steal m ...

 Products

Password leaks are one of the most annoying problems of the digital age. At first glance, it might seem like no big deal: who cares if someone finds out the password to some old e-mail account that is rarely used and contains nothing of value? But then you remember that this same e-mail is linked to your social   show more ...

network accounts, not to mention banking and other apps, and its now in cybercriminal hands. Besides the anguish of losing money and data, such a leak can cause major headaches for your friends, family and colleagues — after all, a hijacked account can be used to send phishing or scam e-mails in your name to all your contacts. In this post, we explain how your credentials can be stolen and how to reduce the risk of them leaking. Sure, caution and vigilance play a massive role in it, but there are hi-tech solutions specifically designed to prevent leaks, which often handle threats much better than the naked eye. Trojan stealers These stealthy spies, once on your device, usually display no visible signs of activity. After all, the longer they remain under the radar, the more of your data they can steal and pass to their handlers, such as passwords for banking apps or gaming services. A Trojan can get on your computer or smartphone if you open a malicious file sent by another user, downloaded from a website or copied from external media. Remember that any executable file from the internet is a potential trap. But even those files that look like non-executables need to be treated with caution. Cybercriminals do their best to fool victims by disguising malicious files as images, videos, archives, documents, etc., and often they succeed. For example, they might change the icon or use a fiendishly cunning filename that mimics a safe format. Whats more, even an ordinary Office document can turn into a trap under certain conditions: a malicious script in the document can exploit a vulnerability in the program you use to open it. Therefore, to combat such leaks, we recommend installing a security solution that can detect and block spyware Trojans. If you use Kaspersky, youre already armed with: File Anti-Virus that scans the contents of your device and any connected media, and detects malicious files; Mail Anti-Virus that blocks dangerous links and attachments in e-mails. Phishing Phishing e-mails come in a variety of forms, but the goal is always to lure you to a fake website and get you to enter your credentials. It might be a message saying your bank account has been blocked, or an early-bird offer to subscribe to an online movie theater. Or it might be a phishing link from an attractive stranger on Tinder, a potential buyer of your product on Amazon, or even a close friend (if their e-mail was hacked by scammers). The standard tip in this situation is to look carefully at the URL: some fake sites have an extra letter in the address, a double domain name, etc. However, that does not always help since modern cybercriminals have learned how to disguise their fakes. For example, in case of a browser-in-the-browser attack, you might see a phishing site with a genuine address. So its better to play it safe and use a security solution that spots phishing attacks and warns you about them. In your Kaspersky application, this is handled by: URL Advisor that checks the URL against a cloud database of dangerous sites; Safe Browsing that checks the site content for malicious elements. Browser attacks Often, passwords get stolen through browser vulnerabilities or extensions. In the first case, specially crafted code on a web page plants spyware on your device. In the second, you yourself install a malicious script under the guise of a handy browser plug-in. After that, when you go to, say, a bank website, this script redirects all traffic through a hacker proxy server, spilling your credentials in the process. The Safe Money feature in Kaspersky provides protection against such attacks. It automatically enables Protected Browser mode when you visit online stores or banks, or use online payment systems. Public Wi-Fi Attackers can also intercept data (including passwords) sent over the network if youre using unencrypted or old WEP-protected Wi-Fi. Another variant is when a hacker sets up a public Wi-Fi hotspot with a name similar to an existing network (usually belonging to a nearby cafe, hotel or business center). The inattentive user connects to the fake hotspot and all their internet traffic flows straight to the cybercriminals. You can avoid such leaks by carefully checking network names, avoiding suspicious access points, and disabling automatic connection to Wi-Fi. Better still, ensure that all your traffic is encrypted, then, even if you do connect to the wrong hotspot, eavesdroppers wont know what youre sending or where. You can enable VPN Secure Connection in your Kaspersky application in the settings under Privacy. Note that with the Plus and Premium versions, you get unlimited VPN traffic. Passwords all around Then of course there are people who write down passwords on sticky notes and bits of paper, then leave them in full view of any passerby. Dont be like them. It is also dangerous to write passwords in insecure text files on your computer or smartphone, or store passwords in the browser for autofilling. So what to do instead? After all, infosec experts bleat on about the need for strong passwords that cant be brute forced. They also dont stop ranting about never using the same password more than once, because if it gets stolen, attackers will have more to steal from you. Is the solution, then, to create a memory palace full of long, complex passwords? But hardly anybody has such a gifted mind. An easier option is to use a password manager protected by strong encryption. Simply enter all your usernames and passwords and memorize just one master password for the vault itself. In your Kaspersky application, this secure vault is provided by Password Manager. Whatever you do, dont write your master password on a sticky note attached to the monitor! External leaks All of the above is about keeping passwords safe at your end, but leaks often occur in remote internet services: online stores, social networks, crypto exchanges, or any other resource with login authentication. By hacking such a site, cybercriminals can get ahold of a huge user database, plus passwords and other personal data. Whats more, the owners of such sites are not always keen to report such hacks. Meanwhile, your data gets passed around or put up for sale on the dark web. Infosec experts monitor the publication of such databases and warn users. As always, however, be careful: here, too, such experts might appear to be scammers in disguise. This is a common phishing method: the user receives a message about an alleged leak and is invited to follow a link to a site asking for their credentials supposedly for verification, whereupon the password is stolen for real. Your Kaspersky application has a service for checking whether a leak really happened or not. Called Data Leak Checker, it is found on the Privacy tab. It lets you check whether your e-mail is spotted in a stolen database somewhere. If so, you will receive a list of leaky sites, the type of data made public (personal, banking, online activity history and so on), as well as recommendations on what to do about it. Protection for all seasons Of course, password theft is not the only misfortune that can befall your digital self. Attackers have all kinds of tricks up their sleeve for stealing valuable data, emptying online bank accounts and causing other harm: spyware, ransomware, fake websites, malicious miners, the list goes on. But never fear: we keep a close eye on cybercriminal creativity and continuously improve our products to deliver the best protection in the world against all digital threats. So, you can always rely on Kaspersky to warn of danger in good time, block malicious objects and generally keep you out of trouble.

 Malware and Vulnerabilities

Group-IB found a link between the ATMZOW JS Sniffer campaign and the Hancitor malware downloader, claiming to be operated by the same malicious actors. The use of the same JS obfuscation method and similar domain names were found in campaigns by ATMZOW and Hancitor. Group-IB posted a number of IOCs connected to the attacks.

 Threat Actors

The TA558 threat actor was found running phishing campaigns targeting several hotels and firms in the hospitality and travel sector, with 15 unique malware families.

 Threat Actors

Iran-based Charming Kitten hacking group, aka APT35, was found using the new Hyperscrape tool to download Yahoo!, MS Outlook, and Gmail inboxes. Hyperscraper has been used on a small number of accounts, fewer than two dozen, all users from Iran. Users are suggested to improve their existing defenses by activating the Enhanced Safe Browsing feature and enrolling in Google’s Advanced Protection Program. 

 Malware and Vulnerabilities

A new Escanor RAT is being advertised on Telegram and the dark web. The RAT comes in both Android and PC versions, with HVNC module and exploit builder. Most of its victims are located in the U.S., the UAE, Canada, Kuwait, Bahrain, Egypt, Israel, Saudi Arabia, Singapore, and Mexico.

 Malware and Vulnerabilities

Researchers have shared details on DirtyCred, a previously unknown privilege escalation vulnerability affecting the Linux kernel. It works the same as Dirty Pipe when it comes to bypassing all the kernel protections. It allows underprivileged processes to write to arbitrary readable files for escalation of privilege.

 Breaches and Incidents

Threat actors are hacking unprotected WordPress sites to display fake Cloudflare DDoS protection pages to propagate malware that installs Raccoon Stealer and NetSupport RAT. The attack used scripts to show the fake DDoS code required to view the site and install the NetSupport RAT. Additionally, the scripts download Raccoon Stealer and run it on the system.

 Malware and Vulnerabilities

Cyble experts have dissected the operation of IBAN Clipper malware that boasts a monthly subscription model for financial frauds on Windows-based systems. IBAN Clipper uses a multithreading way for quick clipper operation and extracts clipboard data to retrieve text data from the clipboard in ASCII Text or UnicodeText format.

 Trends, Reports, Analysis

Attackers moved from large hospital systems and payers, big targets that would likely yield the most data but also have more sophisticated defenses, to smaller hospitals and specialty clinics that lag in security preparedness, staff size, or budget.

 Malware and Vulnerabilities

Researchers uncovered a barrage of campaigns aimed at internet users who often attempt to download pirated software programs. In the attachment comes the RedLine or RecordBreaker stealer payloads. Some of these malicious software include Wondershare Dr. Fone, Adobe Acrobat Pro, 3DMark, and 7-Data Recovery Suite.

 Identity Theft, Fraud, Scams

A new BEC campaign has been discovered combining sophisticated spear-phishing with Adversary-in-The-Middle (AiTM) tactics to hack corporate executives' Microsoft 365 accounts, even those protected by MFA. Corporate executives are suggested to stay alert.

 Trends, Reports, Analysis

Global cybersecurity firm Kaspersky warns of an increase in cyberattacks on Android and iOS devices in the Asia Pacific (APAC) as more people switch to mobile banking in the region.

 Trends, Reports, Analysis

The U.S. Federal Trade Commission (FTC) announced today that it filed a lawsuit against Idaho-based data broker Kochava for selling sensitive and precise geolocation data (in meters) collected from hundreds of millions of mobile devices.

 Breaches and Incidents

Kiwi Farms is a website that hosts user-generated content and discussion forums. The site has been accused of doxing, harassment, and cyberbullying. Kiwi Farms has been banned from several social media platforms and domain providers.

 Breaches and Incidents

Based on the acquired samples and additional insights related to the security incident, the bad actors were able to gain unauthorized access to the government portal allowing them to manage users and records illegally.

 Feed

Ubuntu Security Notice 5584-1 - It was discovered that Schroot incorrectly handled certain Schroot names. An attacker could possibly use this issue to break schroot's internal state causing a denial of service.

 Feed

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday added 10 new actively exploited vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog, including a high-severity security flaw affecting industrial automation software from Delta Electronics. The issue, tracked as CVE-2021-38406 (CVSS score: 7.8), impacts DOPSoft 2 versions 2.00.07 and prior. A successful

 Feed

Twilio, which earlier this month became a sophisticated phishing attack, disclosed last week that the threat actors also managed to gain access to the accounts of 93 individual users of its Authy two-factor authentication (2FA) service. The communication tools company said the unauthorized access made it possible for the adversary to register additional devices to those accounts. It has since

 Feed

A Turkish-speaking entity called Nitrokod has been attributed to an active cryptocurrency mining campaign that involves impersonating a desktop application for Google Translate to infect over 111,000 victims in 11 countries since 2019.  "The malicious tools can be used by anyone," Maya Horowitz, vice president of research at Check Point, said in a statement shared with The Hacker News. "They can

 Feed

If you're heading out of the office on a well-deserved vacation, are you certain the security controls you have in place will let you rest easy while you're away? More importantly – do you have the right action plan in place for a seamless return? Whether you're on the way out of – or back to – the office, our Security Validation Checklist can help make sure your security posture is in good

 Feed

A new ransomware strain written in Golang dubbed "Agenda" has been spotted in the wild, targeting healthcare and education entities in Indonesia, Saudi Arabia, South Africa, and Thailand. "Agenda can reboot systems in safe mode, attempts to stop many server-specific processes and services, and has multiple modes to run," Trend Micro researchers said in an analysis last week. Qilin, the threat

2022-08
MON
TUE
WED
THU
FRI
SAT
SUN
AugustSeptemberOctober