Cyber Attacks

Hackers Using PowerPoint Mouseover Trick to Infect System with Malware

A new code execution technique has been discovered to be used by the state-sponsored threat actor APT28 from Russia to spread malware. This technique takes use of mouse movement in phoney Microsoft PowerPoint slides. According to cybersecurity company Cluster25, the method “is meant to be activated when the user starts the presentation mode and moves […]

Hackers Using PowerPoint Mouseover Trick to Infect System with Malware Read More »

Crypto Trading Firm Wintermute Loses $160 Million in Hacking Incident

Hackers have taken digital assets worth over $160 million from cryptocurrency trading company Wintermute in the latest crypto crime to attack the decentralised finance (DeFi) sector. Unauthorized transfers of USD Coin, Binance USD, Tether USD, Wrapped ETH, and 66 other cryptocurrencies to the attacker’s wallet were part of the hack. The business claimed that the

Crypto Trading Firm Wintermute Loses $160 Million in Hacking Incident Read More »

U.S. Charges 3 Iranian Hackers and Sanctions Several Others Over Ransomware Attacks

Wide-ranging penalties against ten people and two organizations supported by Iran’s Islamic Revolutionary Guard Corps (IRGC) for their involvement in ransomware attacks at least since October 2020 were announced on Wednesday by the U.S. Treasury Department’s Office of Foreign Assets Control (OFAC). According to the FBI, some of the individuals’ online activities can be attributed

U.S. Charges 3 Iranian Hackers and Sanctions Several Others Over Ransomware Attacks Read More »

New Malware Targeting YouTube Gamers Uncovered

Links to harmful password-protected archive files intended to install the RedLine Stealer malware and crypto miners on infected devices are being sent to gamers searching for cheats on YouTube. In a new report released today, Kaspersky security researcher Oleg Kupreev stated that “the videos sell cheats and crackers and provide advice on hacking popular games

New Malware Targeting YouTube Gamers Uncovered Read More »

New EvilProxy Phishing Service Allowing Cybercriminals to Bypass 2-Factor Security

The criminal underworld is promoting a new phishing-as-a-service (PhaaS) toolkit called EvilProxy as a way for threat actors to get beyond the two-factor authentication (2FA) safeguards put in place against internet services. In a report published on Monday, Resecurity researchers stated that “EvilProxy actors are exploiting reverse proxy and cookie injection methods to overcome 2FA

New EvilProxy Phishing Service Allowing Cybercriminals to Bypass 2-Factor Security Read More »

Samsung Acknowledges Data Breach that Leaked Information About Some US Customers

This is the second time this year that South Korean chaebol Samsung has disclosed a cybersecurity incident that led to the unlawful access of certain customer information. Samsung stated in a notice that “in late July 2022, an unauthorized third-party obtained information from several of Samsung’s U.S. networks.” We discovered through our continuing investigation that

Samsung Acknowledges Data Breach that Leaked Information About Some US Customers Read More »

Hackers Distributing Malware Using Fake DDoS Protection Pages

Hackers are using WordPress websites to show fake Cloudflare DDoS protection pages that spread malware like NetSupport RAT and Raccoon Stealer. According to a report last week by Sucuri’s Ben Martin, a recent spike in JavaScript injections that target WordPress sites has led to phony DDoS prevent prompts that direct victims to download remote access

Hackers Distributing Malware Using Fake DDoS Protection Pages Read More »

Okta Hackers Behind Twilio and Cloudflare Breach Hit Over 130 Organizations

The threat actor responsible for the attack on Twilio and Cloudflare earlier this month has been connected to a larger phishing operation that targeted 136 businesses and led to a total of 9,931 accounts being compromised. Because the primary intent of the assaults was to “get Okta identity credentials and two-factor authentication (2FA) codes from

Okta Hackers Behind Twilio and Cloudflare Breach Hit Over 130 Organizations Read More »

Hackers Stole Crypto from Bitcoin ATMs by Exploiting Zero-Day Vulnerability

Manufacturer of Bitcoin ATMs General Bytes acknowledged that it was a victim of a hack that took advantage of a previously undetected software fault to steal cryptocurrency from its consumers. The company stated in an advisory last week that “the attacker was able to remotely establish an admin user via CAS administrative interface via a

Hackers Stole Crypto from Bitcoin ATMs by Exploiting Zero-Day Vulnerability Read More »

Researchers Discover Fake Phones with Backdoors to Hack WhatsApp Accounts

Numerous trojans targeted at WhatsApp and WhatsApp Business are hidden on low-cost Android device models that are knockoffs of prominent smartphone brand names. The trojans, which Doctor Web first identified in July 2022, were found in at least four separate cellphones’ system partitions: the P48pro, Radmi Note 8, Note30u, and Mate40. The cybersecurity company stated

Researchers Discover Fake Phones with Backdoors to Hack WhatsApp Accounts Read More »