Cyber Attacks

A New Trending Hacking Technique Called “Account Pre-Hijacking”

According to new research, malicious actors can get illegal access to users’ online accounts via a new approach known as “account pre-hijacking.” The assault targets the account creation process, which is common on websites and other online platforms, allowing an adversary to carry out a series of operations before an unwary victim establishes an account […]

A New Trending Hacking Technique Called “Account Pre-Hijacking” Read More »

U.S. Warns Against North Korean Hackers Posing as IT Freelancers

Highly skilled software and mobile app developers from the Democratic People’s Republic of Korea (DPRK) are posing as “non-DPRK nationals” in hopes of landing freelance employment in an attempt to enable the regime’s malicious cyber intrusions. That’s according to a joint advisory from the U.S. Department of State, the Department of the Treasury, and the

U.S. Warns Against North Korean Hackers Posing as IT Freelancers Read More »

Web Trackers Caught Intercepting Online Forms Even Before Users Hit Submit

A new research published by academics from KU Leuven, Radboud University, and the University of Lausanne has revealed that users’ email addresses are exfiltrated to tracking, marketing, and analytics domains before such is submitted and without prior consent. The study involved crawling 2.8 million pages from the top 100 websites, and found that as many

Web Trackers Caught Intercepting Online Forms Even Before Users Hit Submit Read More »

Keep an Eye Out! Dockers, AWS, and Alibaba Cloud Are Being Targeted by Cryptocurrency Miners.

As part of an ongoing malware effort, LemonDuck, a cross-platform cryptocurrency mining botnet, is targeting Docker to mine cryptocurrency on Linux servers. In a new study, CrowdStrike stated, “It operates an anonymous mining operation by using proxy pools, which disguise the wallet addresses.” “It avoids detection by targeting and disabling Alibaba Cloud’s monitoring service.” LemonDuck

Keep an Eye Out! Dockers, AWS, and Alibaba Cloud Are Being Targeted by Cryptocurrency Miners. Read More »

The Haskers gang freely distributes ZingoStealer malware to other cybercriminals.

Haskers Gang, a crimeware-related threat actor, has distributed ZingoStealer, an information-stealing malware, for free on the internet, allowing other criminal groups to use it for nefarious purposes. In a study posted with The Hacker News, Cisco Talos researchers Edmund Brumaghin and Vanja Svajcer noted, “It features the capacity to collect personal information from users and

The Haskers gang freely distributes ZingoStealer malware to other cybercriminals. Read More »

Taiwanese Financial Trading Sector Suffers Cyber Attack by Chinese Hackers

Hackers aligned with objectives of the Chinese government have been linked to an organized supply chain attack on Taiwan’s financial sector. These attacks first commenced at the end of November 2021, with the intrusions attributed to a threat actor tracked as APT10, also known as Stone Panda, the MenuPass group and Bronze Riverside, and known

Taiwanese Financial Trading Sector Suffers Cyber Attack by Chinese Hackers Read More »

Interpol Arrests 11 Members of a Nigerian Cybercrime Gang

11 members of a Nigerian cybercrime gang known for perpetrating business email compromise (BEC) have been apprehended by a coordinated law enforcement operation. This comes after a ten-day investigation dubbed Operation Falcon II undertaken by the Interpol along with participation from the Nigeria Police Force’s Cybercrime Police Unit in December 2021. Group-IB and Palo Alto

Interpol Arrests 11 Members of a Nigerian Cybercrime Gang Read More »

Europol Shuts Down VPNLab Popularly Used By Cybercriminals

The popular VPNLab.net used by malicious actors to deploy ransomware has been taken offline following a coordinated law enforcement operation. Europol stated that it took action against the misuse of the VPN service by grounding 15 of its servers on January 17 thus rendering it inoperable as part of a disruptive action that took place

Europol Shuts Down VPNLab Popularly Used By Cybercriminals Read More »

Chinese Hackers Target Academic Institution Using Log4Shell Exploit

Aquatic Panda a China-based targeted intrusion has been observed leveraging critical flaws in the Apache Log4j logging library as an access vector to perform various post-exploitation operations, including reconnaissance and credential harvesting on targeted systems. Crowdstrike a cybersecurity firm stated that the infiltration which was foiled was aimed at an unnamed “large academic institution”. The

Chinese Hackers Target Academic Institution Using Log4Shell Exploit Read More »