Posts

Showing posts from November, 2019

One of Today's Most Popular E-Commerce Platforms Hit By A Major Security Breach

Image
Recently Magento Marketplace, a portal for purchasing, selling, and downloading plug-ins and themes for Magento-based online stores was hit by a major security breach revealed by Adobe, as Adobe acquired Magento for $1.68 billion in May 2018. The impacted users incorporate both the regular ones who purchased themes and plugins as well as the theme developers who were utilizing the portal to sell their code and make money. In an email sent to users, the company said it was the vulnerability in the Magento Marketplace website that permitted "an unauthorized third-party" to access the account data for the registered users. The vulnerability enabled access to user information, like name, email, store username (MageID), billing and shopping addresses, phone number, and limited commercial information like percentages for payments Adobe made to theme/plugin developers. However, fortunately, any account's passwords or financial information were not exposed, according to ...

New Chrome Password Stealer, 'CStealer' Sends Stolen Data to a MongoDB Database

Image
The information collected by the Chrome browser including passwords, usernames, and other user credentials is being exposed to heavy risk as a new trojan known as CStealer attempts to steal the confidential data stored onto Google's Chrome browser. Password stealer trojans include applications that tend to run in the background and silently gather sensitive information about the system such as connected users and network activity. It attempts to steal confidential information stored onto the system and the browsers like usernames, passwords and other credentials which once being stolen are sent to a specified destination by the attacker. While the idea behind this info-stealing trojan is just like many others- which is to steal user credentials saved onto the browser's password manager, however, the fact that CStealer uses a remote MongoDB database to store the stolen data is what makes this case unprecedented and interesting. The malware which was discovered by Malwar...

Security Experts warn about threats before Black Friday

Image
Experts of the antivirus company Kaspersky Lab reported that in the discount season, also known as Black Friday, the number of threats from cyber fraudsters has grown significantly. "According to Kaspersky Lab, the number of phishing threats related to Black Friday has increased significantly over the past two weeks. On the eve of big sales and the upcoming holiday shopping season, cybercriminals are increasingly trying to attack users who prefer to shop online," said the antivirus company. So, in the period from 18 to 24 November, the company recorded almost twice as many fraudulent resources, compared to the previous week. The number of phishing attacks on online stores has also increased.“This growth is especially noticeable in Russia: if approximately every 20th phishing attack was sent to the e-commerce section in Runet two weeks ago, last week phishers tried to attack Russian online stores in every 11th case,” concluded company. As Kaspersky Lab content analy...

Stantinko botnet's strategy now shifts to crypto-mining

Image
Stantinko botnet that's been involved in various criminal ventures has now added a Monero crypto-mining module to its arsenal. Stantiko has since 2012 carried out a range of criminal activities like fraud, ad injections, social network fraud and brute-force password-stealing attacks to Soviet nations targeting Russia, Ukraine, Belarus, and Kazakhstan. But lately, researchers at ESET, discovered that a major source of Stantinko’s monetization since at least August 2018, comes from Monero crypto-mining module. ESET describes the module as, "highly modified version of the xmr-stark open-source crypto-miner," Stantinko’s mining module, dubbed CoinMiner. Stantinko is so powerful that it can "exhaust most of the resources of the compromised machine." ESET elaborate, that each sample of the model is unique and compile a different module for every victim. "This module’s most notable feature is the way it is obfuscated to thwart analysis and avoid detection,...

5 Insider Threat Solutions You Should Follow in 2019

How Can I Protect My Assets? There are five main pillars of organization security that every successful business needs to 5 Insider Threat Solutions You Should Follow in 2019 on Latest Hacking News . from Latest Hacking News https://ift.tt/35LhjuT

An IT contractor accidentally takes down NYPD's high-tech fingerprint database with a ransom malware!

Image
The much-coveted and popular in news for keeping juveniles fingerprints data, the New York Police Department's fingerprint unit yet again gained much attention as it was shut down for hours because of ransomware. The NYPD was hit by this ransom malware when they hired a third-party IT, contractor, to set up a digital display at the police academy in Queens on October 5 last year. And when he connected his tainted NUC mini-PC to the police network, the virus attached itself to the system. The virus immediately spread to 23 machines linked to the department's LiveScan fingerprint tracking system. Deputy Commissioner for Information Technology Jessica Tisch said the officers discovered the malware within hours and contacted the cyber command and joint terrorism task force to solve the potential threat. We wanted to get to the bottom of this,' Tisch said. 'Was this plugged in maliciously was really important for us to get to the bottom of this.' The ransomware ...

Hackers stole half a million profiles from a Russian job search site

Image
The hacker forums got a database of users of the portal jobinmoscow.ru. According to the founder and technical director of Device Lock, Ashot Hovhannisyan, the database has logins and passwords for 500,000 users in addition to the publicly available information. Media noted that some logins and passwords were relevant, if you enter some of them, you could get to the pages of portal users. After the journalist informed the site representative about this, it became impossible to enter the accounts. However, the company owning the site from which the leak occurred confirmed the information about the data leak. "A quick analysis of the situation showed that there are no violations of the law on our part. Our experts analyze any possible threats to the technical security of the site and take the necessary steps to prevent unauthorized use of the site," commented on the leak, Forex Consulting CEO Yuri Mozgovenko. Experts reported that the personal data of customers of th...

Two Discontinued Software Development Kits Found Secretly Harvesting Data From Facebook And Twitter

While data harvesting has always been a problem for Facebook, a recent incident also involved Twitter. Reportedly, Facebook and Twitter Two Discontinued Software Development Kits Found Secretly Harvesting Data From Facebook And Twitter on Latest Hacking News . from Latest Hacking News https://ift.tt/37JCBuF

Thousands of Russians became victims of the Сryptominer

Image
International antivirus company ESET reported that hundreds of thousands of users in Russia, Belarus, Ukraine and Kazakhstan became victims of the Miner Virus. Specialists could not find a special module for cryptocurrency mining for years. According to the company ESET, the mining module is distributed by the Stantinko botnet. This is a complex threat, active at least since 2012. The botnet has self-defense mechanisms that allow operators to remain undetected. Stantinko is most often distributed through torrents and can disguise itself as pirated software. Previously, it was used for advertising fraud schemes: security experts said that over the past five years, the botnet infected more than 500 thousand computers in Russia (46%) and Ukraine (33%). According to ESET, the crypto mining module is CoinMiner. Stantinko is carefully compiled for the new victim, so it is difficult to detect on the device. It is also able to contact with the mining pool through a proxy, the IP addres...

Same Phishing Risks Faced By Start-Ups and Big Corporations

Image
Reports of a near-perfect phishing attempt have surfaced after a large number of remote employees with health and work environment benefits through human resources giant TriNet received such emails. The emails were shared with TechCrunch, an American online publisher, in order to 'verify their authenticity' and when two independent security researchers were approached to offer their evaluations, both were of the view that it was a phishing email indeed contrived to steal usernames and passwords. Furthermore, even a $3.7 billion corporation like TriNet, let alone the other big giants are not doing what's needed to counteract such phishing attack on the grounds that had they proactively utilized basic email security techniques, it would have been significantly simpler to identify that the email was not in actuality a phish, but an authentic company email. Anyway, the issue isn't even a new one for TriNet or for that matter any other big company. For instance j...

As Venezuela's economy plunges, citizens turn to hacking and cybercrime for easy money

Image
Cybercrime is on a rapid rise in Venezuela as an effect of the country's economic and political turmoil, according to a report released Thursday by IntSights, a global threat intelligence company. More and more people are being driven into the underground criminal world as it provides a lucrative alternative to make money. IntSights analysts found sophisticated and systematic operations working to steal personal information of individuals from Latin America, such as bankers and retailers and they either sell the information online to the highest bidder or use it further to dig more data. These hacks and data gathering operations are quite profitable and remunerative for Venezuelans, as they sell it for cryptocurrency like Bitcoin, a better alternative to the drowning national currency-Venezuelan bolivar. Venezuela, once amongst the richest countries in Latin America, with large oil reserves and gold mines has now become a mere shell of its former self as decades of corrupti...

ICQ and Signal are the most secure messengers in Russia, says Vladimir Zykov

Image
Vladimir Zykov believes that ICQ messenger is safer than WhatsApp, but this does not solve the problems. iOS and Android operating systems contain many vulnerabilities that are exploited by hackers. Choosing a messenger for use, Russians are guided mainly by the advice of friends and their own feelings, said Vladimir Zykov, head of the Association of Professional Network Users and Messengers. The expert is sure that ICQ and Signal messengers are the safest in Russia. But few people use them. In General, any messenger for a smartphone does not guarantee absolute security, because a vulnerable operating system controls the messenger. "But if you choose secure mobile software, then the probability of hacking, of course, decreases," said the expert. According to the expert, the situation is due to the fact that most applications run on mobile devices running the operating systems iOS and Android, developed by American companies Apple and Google. Therefore, they have ac...

Finland Municipalities and Government Agencies Prepare for Possible Cyberattack

Image
Finland is adapting to protect itself from a secret criminal organization warning to attack cyber-security if the country fails to pay Bitcoins as the ransom money.  "Around two hundred Finland government bodies and districts participated in the preparation. The situation reportedly concerns a possible group of hackers asking Bitcoin ransom before prosecuting several attacks on cybersecurity," concludes the reports of YLE. The threats are said to be given by #Tietovuoto321 , a crew of criminal hackers. According to reports, the group sent Bitcoin ransom blackmails to more than 200 Finnish government agencies, in response to which the Finland authorities have taken steps. Organizations prepared for further warnings- The training Taisto is conducted by the Population Register Centre, aiming for supporting the technologization of the nation and computerized assistance in Finland. The Population Register Centre works for the Ministry of Finance. As of now, public agencies...

Technology Company Hit by Ransomware Attack, Prevented Access to Crucial Patient Records

Image
Virtual Care Provider Inc, a Wisconsin based technology company that provides cloud data hosting, security, and access management to more than 100 nursing homes was hit by a ransomware attack carried out by Russian hackers. The involvement of Ryuk encryption prevented access to crucial medical records of the patients and administration data related to the medication. After encrypting all the data hosted by the company for its patients and clients, attackers demanded a $14 million ransom in bitcoin in turn for a digital key that would unlock access to the data. Unable to afford the ransom, the company owner said that she is fearful of the consequences of the incident which could lead to the premature death of certain patients and the shutdown of her business. Reportedly, the ransomware was spread via a virus known as 'TrickBot', the company told that it is 'feverishly working' to regain access to crucial data. The officials estimated that about 20% of the company...

Data Breaches That Occurred in 2019 and How Cybersecurity Frameworks Can Work To Prevent Them

Data breaches are expensive. A company that suffers a data breach will spend about $4 million to recover lost information Data Breaches That Occurred in 2019 and How Cybersecurity Frameworks Can Work To Prevent Them on Latest Hacking News . from Latest Hacking News https://ift.tt/2Dia3e2

A Trojan that Steals User's Banking Information via Fake McDonald Coupons

Image
Spread via malvertising attacks, the banking trojan fools its victims through fake McDonald's coupons as a bait. This came into notice when banking details of Latin American buyers were tried to steal. The trojan discovered by experts at ESET is known as Mispadu , and it is similar to other trojans like Casbaneiro and Amavaldo that are found in Latin America. The trojan uses a remote crypto key for covering its original language. Mispadu targets users from Mexico and Brazil. False McDonald’s tokens are used to lure the customers-  The process consists of using bogus McD offer tokens as bait. These discount vouchers are either sent through spam e-mails or facebook ads which when clicked, takes the user to the primary site of the coupon. When the user clicks the button to get the coupon, they are displayed with an MSI option. The hacker uses this MSI installer to start a command that deciphers and performs an initializing course which allows them to connect to a remote server. ...

Aircraft Warning Lights Used By Planes to Avoid Obstacles Found Exposed to The Open Internet

Aircraft warning lights are obviously an important part of aviation since they facilitate the airplanes in tracking obstacles. A slight glitch Aircraft Warning Lights Used By Planes to Avoid Obstacles Found Exposed to The Open Internet on Latest Hacking News . from Latest Hacking News https://ift.tt/35CzFhP

Key features and best practices to look out for when purchasing a laptop

Cybersecurity is no longer a term, reserved only for the super paranoid nerds and/or conspiracy theorists. With hackers getting increasingly Key features and best practices to look out for when purchasing a laptop on Latest Hacking News . from Latest Hacking News https://ift.tt/2OHwzSS

Google Expands Their Android Bug Bounty Program To Award Up To $1.5 Million

Google has recently made a lucrative announcement for bug bounty hunters. Reportedly, Google expanded their bug bounty program for Android Google Expands Their Android Bug Bounty Program To Award Up To $1.5 Million on Latest Hacking News . from Latest Hacking News https://ift.tt/2Ddv8WL

Vulnerability Hit Truecaller App Potentially Affecting Millions Of Users

The popular call-blocking application Truecaller has recently made it to the news due to a security flaw. A researcher discovered Vulnerability Hit Truecaller App Potentially Affecting Millions Of Users on Latest Hacking News . from Latest Hacking News https://ift.tt/34mL596

Best Practices For Protecting Against Phishing, Ransomware and Email Fraud

Image
"Best Practices for Protecting Against Phishing, Ransomware and Email Fraud" Osterman Research conducted a survey among corporate decisions makers in early 2018 and found that nearly 28% of those organizations had experienced a phishing attack that was successful in infecting their networks with malware. Over 17% of organizations had email as part of a CEO Fraud/BEC attack that successfully tricked one or more of their senior executives in the last 12 months. Don’t let this happen to your organization. Download the Osterman Research Whitepaper, Best Practices for Protecting Against Phishing, Ransomware and Email Fraud, and learn ten best practices you should consider to better protect your systems and network, train your users to be security-aware, and safeguard your organization’s sensitive and confidential data from phishing attacks, ransomware, and CEO Fraud. Download Free eBook from Hackers Online Club (HOC) https://ift.tt/2rseY9h

Minister of the Republic of Tatarstan explained how the "sovereign Internet" in Tatarstan works

Image
Airat Khairullin, the Minister of Digital Development of Public Administration, Information Technologies and Communications of the Republic of Tatarstan, told about the main directions of the Ministry's work, the center for digital transformation of the Republic of Tatarstan, as well as about the work of the sovereign Internet in Tatarstan and correspondence in messengers. "If someone tomorrow decides to physically block the DNS server system for Russia, our IP routing may be disrupted. Therefore, we are talking about allowing traffic to be routed at the junction of Russian and foreign providers." According to him, Tatarstan has already created the appropriate infrastructure for the sustainable protection of the Internet from external attacks. Thus, all 10 thousand social objects of the Republic are connected to the Internet through the Data Processing Center (DPC) in the IT Park. There is a second data center for disaster resilience in the Council State. "A...

Ginp – The Latest Android Banking Trojan Found Active In The Wild

Once again, a new banking Trojan variant has surfaced online that draws attention owing to its typical features. Termed ‘Ginp’, Ginp – The Latest Android Banking Trojan Found Active In The Wild on Latest Hacking News . from Latest Hacking News https://ift.tt/33fDNm7

Alert! A Method that Allows Hackers to make Ransomware in your Windows Unseen.

Image
Cyber-Security company Nyotron has caught a new way that lets hackers modify Microsoft files in a unique style that subsisting anti-ransomware are unable to identify. Ransomware is one of the most common cyber-security menaces. "It is said to be the top 2 widely used technique used by hackers, as in the case of hijacking 28 computers appeared," confirms Verizon's data breach inquiry report. Unfortunately, for the present time, it is proving quite hard to be identified. The ransomware can permit attackers to avoid the present computer securities by depending on a data system, which is the ‘rename’ selection in the Windows operating system. This detour can be performed in just two rows of the cipher. That is how simple it is for hackers. What is Ransomware?  Ransomware is a sort of harmful virus, intended to reject entrance to a network system or information. For access to the data, the malware demands a ransom to be paid. It normally grows through fraud e-mails or ...

Vulnerabilities Discovered In Four Popular Open Source VNC Systems

Image
Numerous vulnerabilities in the four well-known open sources virtual network computing (VNC) systems have been as of late identified by Kaspersky researchers however luckily most of them have just been patched. After breaking down the four broadly utilized open source VNC systems, including LibVNC, UltraVNC, TightVNC and TurboVNC, the cybersecurity firm says UltraVNC and TightVNC are frequently prescribed by industrial automation system vendors for associating with human-machine interfaces (HMIs). A sum of 37 CVE identifiers has been allowed to the vulnerabilities discovered by Kaspersky in server and client software. A portion of the defects are said to have been exploited for remote code execution, enabling the attacker to make changes to the targeted system and more than 20 of the security bugs have been thusly identified in UltraVNC. Sometimes, the security firm noticed, the flaws were found as a major aspect of the research project were varieties of previously distingui...

OnePlus Discloses Data Breach Impacting Users’ Personal Information

The smartphone brand OnePlus has recently made it to the news owing to a cybersecurity incident. As revealed by the OnePlus Discloses Data Breach Impacting Users’ Personal Information on Latest Hacking News . from Latest Hacking News https://ift.tt/37B0FQj

Spoofing Vulnerability Found In Microsoft Outlook For Android

Microsoft recently disclosed a vulnerability in Outlook for Android that risked millions of devices. Exploiting the bug could permit cross-site Spoofing Vulnerability Found In Microsoft Outlook For Android on Latest Hacking News . from Latest Hacking News https://ift.tt/2OJ2jXP

T-Mobile Reveals A Security Breach Affecting Prepaid Users

Adding one more to the count of data breaches this year, now joins the cellular firm T-Mobile. Recently, T-Mobile has T-Mobile Reveals A Security Breach Affecting Prepaid Users on Latest Hacking News . from Latest Hacking News https://ift.tt/2XIVUj6

Twitter Users Finally Offered 2FA Account Security Options Other Than SMS

Twitter has recently announced a major update in their system that may bring a sigh of relief for some users. Twitter Users Finally Offered 2FA Account Security Options Other Than SMS on Latest Hacking News . from Latest Hacking News https://ift.tt/2XEvhvW

Pavel Durov, the founder of Telegram advised users to remove WhatsApp from smartphones

Image
The Creator of Telegram messenger Pavel Durov called WhatsApp application unsafe. He recalled a recently discovered vulnerability that allowed hackers and government intelligence agencies to access user data. "WhatsApp not only does not protect your messages, but this app is also constantly being used as a Trojan to track photos and messages unrelated to Messenger," wrote he on the Telegram channel. According to Durov, the problem lies in the policy of Facebook, which owns WhatsApp. Durov noted that his Telegram messenger did not encounter such vulnerabilities in six years of existence. At the same time, he doubted that WhatsApp makes mistakes in the security system due to system imperfections. "It is very unlikely that someone can accidentally allow serious security failures, such convenient for surveillance, on a regular basis," said he.Therefore, Durov urged users to delete WhatsApp. In addition, Durov claimed that WhatsApp, like Facebook, shared user...

Android Camera App Vulnerability Could Allow Attackers to Spy On Users

Google and Samsung smartphones reportedly had a serious security flaw that could allow spying on users. The vulnerability existed in Android Camera App Vulnerability Could Allow Attackers to Spy On Users on Latest Hacking News . from Latest Hacking News https://ift.tt/35tUZG0

DSXS | An open source, simple and effective XSS scanner that can be easily customized

Damn Small XSS Scanner (DSXS) is a great tool for finding cross site scripting vulnerabilities, the tool has been developed DSXS | An open source, simple and effective XSS scanner that can be easily customized on Latest Hacking News . from Latest Hacking News https://ift.tt/2OBdBNy

Jetpack WordPress Plugin Vulnerability Affected Numerous Websites – Patch Now!

Heads up WordPress admins! A researcher has found a critical vulnerability in the Jetpack WordPress plugin. Fortunately, a fix is Jetpack WordPress Plugin Vulnerability Affected Numerous Websites – Patch Now! on Latest Hacking News . from Latest Hacking News https://ift.tt/37q8W9X

Chinese Smartphone Maker OnePlus Discloses Data Breach

Image
Chinese smartphone manufacturer, OnePlus has announced a data breach where the order information including names, contact numbers, email addresses and shipping addresses of customers from its online store was exposed. However, customers' payment information, passwords, and accounts haven't been compromised in the incident. OnePlus ensured that the affected customers are being timely notified. The company told in an FAQ that the breach took place last week and was discovered immediately. According to the officials, it was a certain vulnerability in their website which became the entry point of the attackers. However, no additional details were provided by OnePlus. "We took immediate steps to stop the intruder and reinforce security, making sure there are no similar vulnerabilities. Before making this public, we informed our impacted users by email. Right now, we are working with the relevant authorities to further investigate this incident." the company said i...

Malware creators producing more dangers to mac-OS

Image
Illegal affair in Mac operating system proceeds to increase, with malware makers producing out bugs that aim users of the popular operating system Apple. Discovered by Trend Micro as 'backdoor.macOS.nukespeed,' a new modification of a Mac backdoor is associated with the cyber-criminal club Lazarus, which was recently infamous for targeting Korean organizations with a crafted MS Excel spreadsheet. Connections to a first Lazarus routine-  A malicious sample that was discovered by a twitter user named cyberwar_15 was analyzed, and the experts found that the virus used an embedded excel sheet to target the user. This kind of attack is similar to the one which was conducted by the Lazarus group. But, contrary to the earlier hack which includes many routines based on the Operating system the Excel sheet is running on, the embedded macro in this catalog will simply work a PowerShell text that joins to 3 C&C servers, established by the group Lazarus. The Mac package also ho...

Huawei to Reward Hackers for Discovering Any ‘Secret Backdoors’ In Its Smartphone Technology

Image
With the hopes of outdoing Google, Huawei announced in a "big bounty launch" to reward hackers for exhibiting a "critical" weakness in one of its Android devices. Revealing the program at a private event for a few of the world's top Android hackers at Munich, Germany, a week ago, so much so that it even gave an example as to how the hackers could bag the first prize, as they would need to get remote access to the device without the target 'having to click anything'. A high-severity hack would even see that the hacker could assume control over a phone when they had direct access to it. The company is said to have been following Apple's lead in keeping the 'bug bounty invite-only'. As revealed on Twitter by Forbes 30 Under 30 alum Maria Markstedter, who was one of the invited guests, the researchers who were welcomed would likewise be offered tokens to invite other altruistic hackers too. The bug bounty was at first announced by Tech...

A Review Of Yodot Recovery Software For Windows And Mac

While SD cards provide a wonderful means to store photos, videos, and other data, they need careful handling since they A Review Of Yodot Recovery Software For Windows And Mac on Latest Hacking News . from Latest Hacking News https://ift.tt/2Xy9IwW

US student was allegedly building a custom Gentoo Linux distro for ISIS

Image
Institute For Ethical Hacking Course  and  Ethical Hacking Training in Pune – India Extreme Hacking  |  Sadik Shaikh  |  Cyber Suraksha Abhiyan Credits: Zdnet US authorities have arrested and charged a 20-year-old student from Chicago with providing material support to ISIS. According to court documents, the teen allegedly created a Python script to automate saving ISIS multimedia from official social media channels, so other members could re-post it on their own accounts, and help spread the terrorist group’s propaganda. Furthermore, the student, Thomas Osadzinski, 20, from Chicago, also promised to build a lightweight Gentoo Linux distro for the terrorist organization. “I will began a new and very valuable project,” the student wrote in an online discussion with an undercover FBI agent in March this year. “I will be developing a custom gentoo linux version designed for ansar [ISIS supporters] it can run on any computer and will be very lightw...

New Bug that hacks WhatsApp and makes DoS Attacks through crafted MP4 Files

Image
A latest risky threat has been identified in both Android/iOS devices' WhatsApp version. The bug allows hackers to transmit tampered MP4 folders to WhatsApp users, which enables the Dos and Remote Code Execution Attack. Whatsapp is one of the most popular social media apps in the world, with billions of Android and ios users. The threat is categorized as a “Risky” vulnerability that struck a remote code block of MP4 files in the Whatsapp database. The bug exploits the user's device and manipulates a piece of information to hit the memory of WhatsApp Messenger. The vulnerability allows hackers to use the bug on the user’s smartphone to take important data and also allows surveillance of user activity. “The bug can activate a stack-based buffer in the user's Whatsapp account by transmitting tampered MP4 folders. The problem was already breaking down the primary metadata of the MP4 files. This could lead to an RCE or DoS attack," says the Facebook advisory board on ...

Six Tips to Safely Shop Online During Black Friday and Cyber Monday 2019

The Thanksgiving weekend is just right around the corner. While some would still associate the upcoming holiday as time to Six Tips to Safely Shop Online During Black Friday and Cyber Monday 2019 on Latest Hacking News . from Latest Hacking News https://ift.tt/2D0jq1R

Windows Security Warning- Ransomware is Rapidly Growing and Got Difficult to Guard Against

Image
Security experts are predicting an unusual rise in ransomware attacks and a strategic change in the cybercrime ecosystem which is directed to evade detection and fail the existing defense mechanisms against it. As the ransomware attacks will expand in scale with a heightened influence, few dominant players currently present are expected to disperse themselves into multiple smaller ones. Ransomware infects the victim's computer by locking down the hard drive and encrypting the data present onto the system, then the attacker asks the victim to pay the demanded ransom in due time and if the victim fails to do so, the data is gone forever. The virus spreads across infected networks via a worm and encrypts several machines in a row. After an in-depth analysis of various 'Windows security threats' such as coin miners, file-less malware, ransomware, PUAs, banking Trojans, Global cybersecurity company, Bitdefender concluded that out of all, the threat posed by ransomware is ...

Macy’s Became The Latest Victim Of MageCart Attack

It hasn’t been a while since we heard of a MageCart attack, however now, Macy’s has disclosed a similar attack. As Macy’s Became The Latest Victim Of MageCart Attack on Latest Hacking News . from Latest Hacking News https://ift.tt/2QDjBrI

The Cyber Essentials Checklist: How Accreditation Can Help Executives Grow Their Business

Since the dawn of the computer era, entrepreneurs and hackers have been in a constant race to outwork each other. The Cyber Essentials Checklist: How Accreditation Can Help Executives Grow Their Business on Latest Hacking News . from Latest Hacking News https://ift.tt/35jl4HJ

Malware on Official Monero Website Can Steal Crypto: Investigator

Image
Institute For Ethical Hacking Course  and  Ethical Hacking Training in Pune – India Extreme Hacking  |  Sadik Shaikh  |  Cyber Suraksha Abhiyan Credits: CoinTelegraph The software available for download on Monero’s (XMR) official website was compromised to steal cryptocurrency, according to a Nov. 19 Reddit post published by the coin’s core development team. The command-line interface (CLI) tools available at getmonero.org may have been compromised over the last 24 hours. In the announcement, the team notes that the hash of the binaries available for download did not match the expected hashes. The software was malicious On GitHub, a professional investigator going by the name of Serhack said that the software distributed after the server was compromised is indeed malicious, stating: “I can confirm that the malicious binary is stealing coins. Roughly 9 hours after I ran the binary a single transaction drained the wallet. I downlo...

3 ways an attacker may compromise a phone without the victims knowledge

We carry our mobile phones everywhere with us. These devices store our personal information. If this data falls into the 3 ways an attacker may compromise a phone without the victims knowledge on Latest Hacking News . from Latest Hacking News https://ift.tt/2D1V5ss

The Russian Railways information system got hacked in 20 minutes

Image
Specialists of Russian Railways will conduct an investigation after the statement of the Habr user that he hacked the Wi-Fi network during a trip on the Sapsan high-speed train and gained access to the data of all its users in 20 minutes. According to the company, the hacked network did not contain personal data, but only entertainment content. On Friday, November 15, user keklick1337 on the portal Habr.com was returning from Saint-Peterburg, where he visited the ZeroNights information security conference, to Moscow. The programmer became bored, and he decided to check the reliability of the Wi-Fi and easily gained access to the hidden data of Russian Railways. He noted that " the same passwords and free security certificates are used everywhere, and the data is stored in text documents." "It is not difficult to access the data of the passengers of the train and it takes at most 20 minutes", noted the author of the post. "The server of the information ...